US5321242A - Apparatus and method for controlled access to a secured location - Google Patents

Apparatus and method for controlled access to a secured location Download PDF

Info

Publication number
US5321242A
US5321242A US07/811,720 US81172091A US5321242A US 5321242 A US5321242 A US 5321242A US 81172091 A US81172091 A US 81172091A US 5321242 A US5321242 A US 5321242A
Authority
US
United States
Prior art keywords
access
message
encoded
terminal
secured
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US07/811,720
Inventor
William D. Heath, Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Brinks Network Inc
Original Assignee
Brinks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US08/231,326 priority Critical patent/US5451757A/en
Application filed by Brinks Inc filed Critical Brinks Inc
Priority to US07/811,720 priority patent/US5321242A/en
Assigned to BRINK'S INCORPORATED, A CORP. OF DELAWARE reassignment BRINK'S INCORPORATED, A CORP. OF DELAWARE ASSIGNMENT OF ASSIGNORS INTEREST. Assignors: HEATH, WILLIAM D., JR.
Priority to CA002083228A priority patent/CA2083228C/en
Priority to EP92310549A priority patent/EP0546701A2/en
Priority to JP32934492A priority patent/JPH0689383A/en
Application granted granted Critical
Publication of US5321242A publication Critical patent/US5321242A/en
Assigned to BRINK'S NETWORK, INC. reassignment BRINK'S NETWORK, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRINK'S INCORPORATED
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F9/00Details other than those peculiar to special kinds or types of apparatus
    • G07F9/06Coin boxes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Definitions

  • This invention relates in general to controlling access to a secured or locked location, and relates in particular to an apparatus and method for providing controlled access by an identification number known only to an authorized person and by an access code known only at the secured location.
  • vending machines and pay telephones are available to the public and accrue varying amounts of cash as they dispense goods or services to customers. These machines periodically are serviced to remove the money and, in the case of vending machines, to replenish the supply of products. Persons authorized to service pay telephones or vending machines must carry keys permitting access to the coin box or other receptacle receiving money paid into the machine. Pay telephone coin boxes are serviced by a collector who periodically visits each pay phone. The collector unlocks an outer door to the phone using a key for that purpose, and then removes the coin box from within the phone and substitutes an empty coin box.
  • the collector is allowed to carry one or more master keys for servicing a number of telephones, the risk of loss by theft or misappropriation of a single key is apparent.
  • requiring the collector to carry a separate key for each pay phone represents a significant inconvenience, particularly in areas such as airport terminals where large numbers of pay phones are located.
  • the risk of loss through theft or misuse of individual keys still exists.
  • ATMs Automated teller machines
  • ATMs are another example of machines containing cash and requiring periodic access for replenishing the cash supply or maintaining and repairing the machines. Because ATMs are capable of containing large amounts of money relative to most vending machines, they are more inviting targets for theft. For this reason, the cash within an ATM is contained within a small vault integral with the ATM and typically accessible only through a vault door having a combination lock, sometimes combined with a key access, for opening the vault door. Portions of the electronic controls for the ATM also may be located within the vault to prevent unauthorized cash dispensing by tampering with control circuits. Generally speaking, the cash within a locked ATM is secure from any unauthorized activity short of safecracking.
  • Prior-art techniques are known for providing keyless access to ATMs or other machines containing significant amounts of cash. These techniques generally require an electronic link between the machine and a central office, and an arrangement for unlocking the vault whenever the proper signal arrives from the central office. To avoid the cost of providing dedicated lines between the central office and a great number of ATMs, these prior-art techniques usually rely on the public telephone network and a modem associated with each ATM, in order to communicate between the central office and a selected ATM. While these techniques relieve the service technician of the need to carry either access keys or combinations for the ATM vaults, it still leaves the technician subject to being hijacked by robbers who will then coerce the technician to request access from the central office.
  • a call for service or repair of an ATM or another secured device is reported to a service technician, along with a unique encoded access message generated for the particular occasion.
  • the technician can receive this access message by telephone or radio dispatch, because the information contained therein is encrypted so as to conceal the information.
  • This access message contains the personal identification number (PIN) identifying that particular technician, the serial number or other unique identifier of the particular portable terminal, present and future access codes for the secured device, and other information appropriate for a particular application, all as encrypted in the encoded access message.
  • PIN personal identification number
  • the technician carries a portable terminal and enters the access message into that terminal along with a PIN, and the portable terminal verifies access message was entered in the correct terminal and that the proper PIN was used.
  • the technician then travels to the location of the ATM or other device requiring service. At that location, the technician connects the portable terminal to the secured device and once again enters the PIN into the terminal, where that number again is verified against the access code previously contained in the encoded access message.
  • This double verification of the technician's PIN thwarts unauthorized access in a situation where the technician is hijacked after receiving a service call from the dispatcher and then entering the proper PIN into the portable terminal for self-authentication.
  • the encoded message is sent to the device where a computer checks for the presence of correct information identifying the device and authenticating the access being requested, and allows access to the vault only if that correct information is present.
  • the present system accommodates the departure of a technician simply by retiring that person's PIN number from further use and assigning new numbers for new technicians. Any unauthorized interception of an access message thereafter by a former technician will fail, even if intercepted by someone possessing a portable terminal obtained by theft or fraud, because the serial number of that terminal will not match the corresponding number in the encoded access message and because that person does not know the new PIN for use by someone else and encoded into the access message.
  • the encoded access message transmitted to the technician includes a present access code for gaining access to the secured location at the present time, in addition to the PIN for the technician authorized for that access.
  • This present access code must correspond to an access code previously stored at the secured location, or else the system will deny the present attempt to gain access to the secured location.
  • the encoded access message also contains a new access code intended for future use by that particular secured location. If the PIN entered by the technician matches the PIN encoded in the access message and if the present access code within that message matches the access code previously stored at the secured location, then access is granted and that present access code is erased and replaced by the new access code contained in the encoded message.
  • This new access code remains stored at the secured location and becomes the authorized access code for use the next time access to that location is sought.
  • each access code is used only one time and anyone attempting to create an encoded access message for a particular location must have present knowledge not only of that location, the authorized PIN for a particular technician, and the serial number of the particular portable terminal authorized for that technician, but must also know the access code previously stored at that secured location. Without this specific information, and other information as may be appropriate and as described further herein, an attempt to counterfeit an encoded access message will fail.
  • Each present access code preferably is unique to a particular secured location and may be based on a randomly-generated number, so that the likelihood of duplicating that number by chance becomes so low as to be negligible in practice.
  • the ATM can maintain a historical file of all attempts to access the vault, whether granted or disallowed. If a loss occurs, one can consult the historical file for preloss activity. This information may also predict problems arising from repeated attempts to access the vault.
  • FIG. 1 is a schematic view illustrating the flow of information required for gaining access to a secured location according to a first preferred embodiment of the present invention.
  • FIG. 2 represents the information contained in an encoded access message according to the first embodiment.
  • FIGS. 3 and 3A are pictorial views illustrating a portable terminal used in the first embodiment.
  • FIG. 4 is a block diagram illustrating components of the portable terminal and interfacing components of an ATM, in the first embodiment.
  • FIG. 5 is a perspective view showing the access latch mechanism according to the preferred embodiment.
  • FIG. 6 is a fragmentary elevation view of the latch mechanism shown in FIG. 5.
  • FIG. 7 is a flow chart illustrating operational steps in the method of the first embodiment.
  • FIG. 8 is a block diagram of apparatus for controlled access to the coin box of a pay telephone according to a second preferred embodiment of the present invention.
  • FIG. 8A is a schematic diagram of a pay telephone circuit according to the second embodiment.
  • FIG. 9 is a flow chart illustrating operational steps of the second embodiment.
  • FIG. 10 is a block diagram of a pay telephone coin box access apparatus according to a third preferred embodiment of the invention.
  • FIG. 11 is a flow chart illustrating operational steps of the third embodiment.
  • FIG. 11A is a flow chart illustrating operational steps of the bar-code scanning option disclosed with regard to the second and third embodiments.
  • FIG. 1 shows a functional outline of a secured access system according to a preferred embodiment of the present invention.
  • This secured access system includes at least one secured location 10, such as an ATM or other apparatus having a vault or other secured enclosure normally kept locked and inaccessible persons.
  • secured location 10 such as an ATM or other apparatus having a vault or other secured enclosure normally kept locked and inaccessible persons.
  • systems utilizing the present invention are associated with a number of separate secured locations, such as the ATMs belonging to a particular bank or located in a particular area.
  • a number of these secured locations 10 are serviced by one or more technicians 11 in response to instructions received from a dispatcher 12 at a central location.
  • Each technician 11 carries a portable computer terminal 13 which may be a conventional hand-held terminal programmed to function as pointed out below in greater detail.
  • the dispatcher 12 receives information as indicated by the line 16, concerning problems with a secured location 10. These reports may be relayed from the bank or other institution that operates or sponsors the secured locations, or alternatively may come directly from the secured locations themselves by way of telephone links reporting a problem at the secured location. Upon receiving a problem report concerning a particular secured location 10, the dispatcher 12 obtains from the dispatch computer 17 an encoded access message that a selected technician 11 must use to gain access to that particular secured location. This access message contains various information as pointed out below in greater detail, including information identifying the present access code previously stored at that location, the PIN of the particular technician 11 selected by the dispatcher to visit the secured location, and the serial number of the portable terminal 13 assigned to that particular technician.
  • the foregoing information preferably is contained in a database maintained at the dispatch computer 17.
  • the dispatch computer 17, at the request of the dispatcher 12, generates a number containing the foregoing access information in encoded form. This number thus becomes an encoded access message which the dispatcher 12 can send to the technician 11 over an open link 18, such as a telephone line or radio dispatch communication, without concern that unauthorized interception of the encoded access message will yield any useful information to anyone lacking the proper terminal 13 and the PIN of the technician.
  • the technician 11 upon learning from the dispatcher 12 that a particular secured location 10 requires attention and receiving the encoded access message for that particular job, manually enters that access message into the portable terminal 13.
  • the technician also enters his or her assigned PIN into the portable terminal 13.
  • the portable terminal compares its own serial number or other internal identification number with the known serial number of the terminal assigned to the particular technician 11, as based on information within the database of the dispatch computer 17, to confirm that the access information was entered into the proper portable terminal.
  • the manually-entered PIN also is compared with the PIN encoded in the manually-entered access message to make certain those PINs match; the portable terminal preferably is programmed to erase the entire encoded access message at this time, if the PIN manually entered by the technician does not match the PIN information contained within the encoded access message received from the dispatcher 18. This erasure of the access message aborts the access procedure without recourse, so that a hijacked terminal 13 cannot thereafter be disassembled and the internal memory electronically read by a technically-sophisticated thief in an effort to retrieve the encoded access message from the portable terminal.
  • the technician After the portable terminal 13 verifies it is the proper terminal indicated in the encoded access message and that the proper PIN was entered, the technician then travels with the terminal 13 to the secured location 10. At that location, the technician connects the portable terminal 13 to the ATM or other apparatus at the second location, whereupon the portable terminal transfers to the secured location the encoded access message that the technician previously received from the dispatcher and entered into the portable terminal. At this time the technician must again enter his PIN into the portable terminal, where that number again must match the PIN encoded in the access message.
  • the computer within the secured location also compares the serial number of the portable terminal 13 with the terminal serial number within the encoded message, to confirm that the terminal connected to the secured location is in fact the terminal assigned to the particular technician based on information within the encoded access message.
  • a "present access code" previously stored at the location 10 is compared with a present access code within the encoded access message and obtained from the database of the dispatch computer 17. If those present access codes match, the vault door or other access port at the secured location is released, allowing access by the technician 11 for service or maintenance.
  • the secured location at this time may return information to the still-connected portable terminal 13 indicating that access was granted, together with the date and time this access began and ended.
  • the technician 11 can later upload that access-related information from the portable terminal 13 to the dispatch computer 17, thereby providing the dispatcher 12 with an historical record of telling when and by whom various secured locations 10 were accessed.
  • an alarm signal is optionally provided along the line 21 to an alarm 22.
  • This alarm 22 preferably is an off-site alarm located remotely from the secured location 10, with the alarm transmitted along a telephone line or radio link represented by the line 21 to alert the police or other authorities about a possible unauthorized attempt to gain entry, to protect the safety of a hijacked technician forcibly detained at the secured location 10.
  • the information contained in the encoded access message used with the preferred embodiment of the present invention is shown in FIG. 2. That information includes the PIN 26 identifying the particular technician 11 dispatched for a service call to an ATM, and the serial number 27 of the portable terminal 13 assigned to that technician.
  • the encoded access message also contains the present access code 28 corresponding to an access code previously stored at the ATM in question, and the "next access code" 29 that replaces the present access code at the ATM upon successful authorization of the present access.
  • the access message can include other information relevant to security, such as an ATM code identifying the particular ATM to which the technician 11 has been dispatched, and the date and time of this particular service request.
  • a check sum digit 32 may also be incorporated into the information contained in the encoded access message, as is known to those skilled in the art.
  • the information contained in the access message as illustrated in FIG. 2 is encoded by appropriate known public encryption algorithms such as the Data Encryption Standard (DES), which is widely documented and has been accepted by the banking industry for electronic information exchange. Encryption and decryption of information as used herein thus is within the skill of the art.
  • the actual encoded access message delivered by the dispatcher 12 to the technician 11 thus consists, for example, of a 12-digit string having no humanly-perceptable relation to the information depicted in FIG. 2. That 12-digit string is subsequently decoded by software within the portable terminal 13 and within the secured location 10 after the encoded access message is transferred to that location.
  • a portable terminal 13 used in the preferred embodiment of the present invention is shown in FIG. 3, and the major operational components of that terminal are depicted in FIG. 4.
  • the portable terminal 13 includes a keyboard 36 connected to a central processing unit (CPU) 37, which in turn drives a display 38.
  • a memory 39 is connected to the CPU and contains stored programming to perform the operational steps as described below.
  • the display 38 comprises a flat LCD panel which in that figure displays an alphanumeric keypad and also displays the command "Enter PIN:" 40 at the upper-left corner of the panel.
  • the electrical contacts of the keyboard 36 are situated beneath the flat panel display 38, which is sufficiently flexible or otherwise responsive to the finger pressure of a person entering an alpha/numeric PIN and then pressing the "Enter” key 41 appearing at the lower-right corner of the display 38 in FIG. 3.
  • Portable terminals suitable for use with the present invention are obtainable from various sources.
  • the programming of such terminals is well known to those of ordinary skill of the art and need not be further described herein.
  • the programming code to perform the steps described herein preferably is stored in battery-powered RAM within the terminal, so that the programming is electronically erasable in the event of tampering with the terminal.
  • the alpha/numeric keyboard and menu display 39 generated on the display 38 of the portable terminal 13, as shown in FIG. 3, is selectively replaceable by a programmed message display, such as the message "ADMISSION GRANTED" shown on the display 38 in FIG. 3A.
  • a cable 44 extends from the portable terminal 13 for connecting that terminal to an RS-232 port at the ATM or other secured location 10, as depicted in FIG. 4.
  • the cable 44 provides a interface for transferring data between the CPU 37 of the portable terminal 13 and the CPU 46 forming part of the present apparatus at the secured location 10, although those skilled in the art will understand that other data-transfer techniques can be substituted for the cable.
  • That secured location 10 further includes a memory 47 associated with the CPU in the conventional manner. An output from the CPU 46 is connected via the signal line 48 to selectably drive a solenoid latch 49 when admission to the secured location 10 is granted.
  • the CPU 46 at the secured location 10 optionally provides a signal on the line 21 leading to the silent alarm which, if present as previously mentioned, can indicate an unauthorized access such as entry of the wrong PIN or deliberate entry of a PIN previously chosen to alert others that an emergency exists at the secured location.
  • FIGS. 5 and 6 show the inside of a vault door 52 modified according to the present invention.
  • the vault door 52 is of a kind typically used in ATMs and is shown opened in FIG. 5.
  • This vault door includes a locking bolt 55 in the form of heavy steel plate extending parallel to the open edge 54 of the vault door.
  • the locking bolt 55 slides within the fixed sleeve 53 along one side thereof adjacent the door edge 54.
  • the locking bolt 55 thus is supported to move laterally from its unlocked position shown in FIG. 5, leftward as indicated by the arrow 56 to a locked position in which the locking bolt engages mating structure (not shown) adjacent the open portal of the vault to retain the vault door shut in the portal.
  • the locking bolt 55 is moved between open and closed positions by rotating the conventional handle 59 located on the front side of the door 52.
  • the handle 59 rotates the lever 60 on the inside of the vault door, imparting lateral movement to the locking bolt 55 through a pin and link connection to the lever.
  • the combination lock and/or key lock conventionally used with the handle 59 are omitted herein for clarity.
  • a bar 63 is attached at one end to the locking bolt 55 and extends perpendicular to that locking bolt, as best seen in FIG. 6.
  • the bar 63 thus moves with the locking bolt 55 as that bolt is moved laterally by operation of the handle 59.
  • the solenoid latch 49 is mounted on the inside of the door 52 at one side of the bar 63, so that the solenoid armature 64 extends toward the bar.
  • a spring 65 is concentric with the solenoid armature 64 and biases that armature in a direction toward the bar 63.
  • An opening 68 sized to receive the free end of the solenoid armature 64 extends through the bar 63.
  • This opening 68 is positioned on the bar 63 in relation to the armature 64 so that the opening becomes aligned with the armature only when the locking bolt 55 of the vault door 52 is moved leftwardly, as indicated by the arrow 56 in FIG. 5, to the locked position.
  • the spring 65 forces the solenoid armature 64 upwardly to enter the opening 68 and lock the bar 63 in position as shown in FIG. 6.
  • This engagement of the bar 63 by the bolt 64 thus effectively prevents withdrawing the locking bolt 55 from its locked position by movement of the handle 59, unless the solenoid 49 is energized to withdraw the armature from engagement with the bar 63.
  • this service request commences according to the disclosed embodiment when a dispatcher learns that a particular ATM requires maintenance or service.
  • the dispatcher selects a particular technician for the job, and then enters the identification of the ATM and that technician into the dispatch computer 17 (FIG. 1) which obtains from its database the required information including the PIN of the selected technician, the serial number of the portable terminal assigned to that technician, the present access code previously stored in ATM, and other information as shown in FIG. 2.
  • the computer then encrypts that information, producing a 12-digit encoded access message in the present embodiment as shown at 70 in FIG. 7.
  • the dispatcher then tells the technician the location of the ATM requiring service and announces the 12-digit encoded access message.
  • the technician Upon receiving this message, the technician manually enters the 12-digit access message into the portable terminal 13 using the keyboard 36 for that purpose, as indicated at step 71 in FIG. 7.
  • the portable terminal 13 decrypts the encoded access message as shown at 72 and then compares the terminal serial number 27 (FIG. 2) contained in the access message with the actual serial number programmed into that terminal, as shown at 73 in FIG. 7. If those serial numbers do not match, the terminal 13 aborts the access attempt at that time and displays an appropriate message for the technician on the display 38 of the portable terminal. This aborted access safeguards against access attempts using a terminal obtained by theft or remaining in the possession of a former technician no longer authorized for access to an ATM.
  • step 73 the terminal then prompts the technician as shown at 40, FIG. 3, to enter his PIN into the terminal. This step is shown at 74 in FIG. 7.
  • the terminal compares the manually-entered PIN with the technician's authorized PIN 26 (FIG. 2) contained in the encoded access message. If those PINs don't match, the terminal prompts the technician to re-enter the PIN at the keyboard. However, if three repeated attempts to enter the technician's PIN produce no match, the terminal 13 aborts the access attempt and erases the entire encoded access message as shown at 75 in FIG. 7.
  • the terminal 13 displays a message acknowledging that entry and then erases the manually-entered PIN from its memory.
  • This erasure of the PIN shown at 77, provides another level of security, as that PIN cannot be determined by electronic inspection of a terminal hijacked from a technician after entry of the proper PIN.
  • the terminal then re-encrypts the access message using a second encryption algorithm different from the first such algorithm for an added level of security, as shown at step 78 in FIG. 7.
  • the technician After the technician has entered the proper PIN into the terminal 13 as discussed above, the technician travels to the location of the ATM and connects the terminal 13 to the CPU 46 of the ATM, using the cable 44 for that purpose as illustrated in FIG. 4. The technician then re-enters the PIN as shown at 79 into the portable terminal, which must reconfirm that the proper PIN is presented as shown at 80. This occurs after the re-encrypted access message is transferred to the CPU 46 in the ATM, as shown at 81 in FIG. 7. Where the access message is decrypted by that CPU. At this time, the present access code 28, contained within the access message, is compared at 82 with the present access code previously stored in memory 47 at the ATM. If these access codes don't match, the attempted access is aborted at that point as indicated at 83 in FIG. 7.
  • the re-entered PIN is compared with an alarm PIN as shown at step 84. If that PIN previously re-entered at step 79 matches the alarm PIN contained within the encoded access message, the system performs certain alarm functions as previously discussed. Otherwise, access to the ATM is allowed as indicated at 85, FIG. 7.
  • the CPU 46 at the ATM accomplishes this access by sending a signal along line 48 to activate the solenoid 49, FIGS. 5 and 6, withdrawing the armature 64 of the solenoid from the opening 68 in the bar 63 connected to the locking bolt 55 of the vault door. The technician can then rotate the handle 59 to withdraw the locking bolt 55 from engagement with its receptacle in the vault, thereby unlocking the door for access to the vault.
  • the present access code previously stored within memory 47 at the ATM is erased as shown at 89 and replaced with the next access code 29 contained in the encoded access message.
  • This next access code remains in memory 47 and in effect becomes a new "present access code” for this particular ATM.
  • both access codes are erased in the portable terminal as shown at 90.
  • the next access code 27 also is stored at the dispatch computer 17. The next time access to this particular ATM is required, the dispatch computer 17 will generate a new encoded access message in which the current "next access code" 29 will become the "present access code" for that new access message.
  • This updating of the access message stored at the ATM or other secured location 10 is a significant aspect of the present invention, because each authorized access to the ATM automatically updates the access code required for the next access to that ATM. No subsequent access to the ATM is possible without that updated access code, which is known only in memory 47 within the particular ATM and at the dispatch computer 17.
  • the CPU 46 associated with the ATM 10 initially includes a default access code which is used (and then replaced) for the initial access to the vault. This default access code may be set by jumper connectors attached to a circuit board and removed when the system is initialized.
  • the CPU 46 and memory 47 preferably have a battery backup power source to prevent memory loss during power outages.
  • This access information can include verification that access was allowed, the date and time of such allowance, and the time that the access was terminated, i.e., that the technician closed and relocked the vault door 52.
  • the technician periodically uploads this access information from the portable terminal 13 to the dispatch computer 17, either by directly connecting the portable terminal to the dispatch computer or by dial-in telephone link as appropriate to the particular work patterns of the system.
  • This information allows the dispatcher to maintain a database showing the workload of each technician, including the response time for each service call and the time elapsed while the vault door of each ATM remained open.
  • the access information also can include the date, time, and disposition of all attempts to access, the PINs and terminal serial numbers employed with those attempts, and other relevant date possibly indicating unauthorized activity at that location.
  • Modifications to the program access steps shown in FIG. 7 are permissible. For example, after a technician has gained access to the vault, he may find that a particular replacement part or service tool is required from the service vehicle. Security procedure requires that the technician must not leave the open vault unattended, but locking the vault door otherwise will require reinitiating the access authorization procedure shown in FIG. 7. However, once access has been allowed as shown at step 85 in that procedure, the program can be modified to allow the technician to close and relock the vault door but leave the terminal 13 connected to the ATM while obtaining the desired component from the service vehicle. Upon returning to the ATM, the technician merely re-enters the PIN into the terminal 13, whereupon the solenoid latch 49 is again activated to unlock the vault door if the proper PIN was entered.
  • FIGS. 8, 8A, and 9 show an embodiment intended for use in controlling access to the coin boxes of pay telephones.
  • a typical pay telephone 89 includes a ringer 91 connected in parallel across the sides 92a, 92b of the telephone line 92 connecting the pay telephone to the telephone central office in the conventional manner.
  • the ringer circuit is modified according to the present invention so that the side of ringer 91 connected to the line 92a passes through the switch 93 having a default condition connecting line 92a to the ringer, as shown in FIG. 8A.
  • Actuating the switch 93 in response to the access circuit 97 removes the line 92a from the ringer and instead connects that line to one side of the solenoid lock 94.
  • the other side of the solenoid lock 94 is connected to the line 92b.
  • the switch 93 is under operational control of the access circuit 97 connected across the telephone lines 92a and 92b, which extend beyond the access circuit for connection with the conventional dialing, speech, and coin-control equipment forming part of the pay telephone.
  • the access circuit 97 which in practice is disposed on a circuit board mounted within the pay telephone, contains a processor programmed to store a predetermined access code, to compare that stored access code with a present access code received over the telephone line 92a, 92b, and to temporarily set the switch 93 so that ringing current from the telephone central office is temporarily diverted from the ringer 91 to the solenoid 94.
  • the processor within the pay telephone also decrypts the access information received from the portable terminal and the central office, if that information is initially encrypted.
  • the solenoid lock 94 is activated by ringing current from the central office the next time this particular pay phone is called.
  • the solenoid lock 94 thus unlocks the outer door 130 enclosing the coin box 131 of the phone, enabling the collector to service the coin box without using a key.
  • a collector servicing pay phones equipped according to the present invention carries a portable terminal 96 equivalent to the terminal 13 described hereinabove.
  • portable terminals for pay-phone access preferably include or are modified to include an acoustic coupler for establishing audio communication with the existing handset 98 of the pay telephone.
  • the collector visits each pay phone chosen for collection on a particular day, the collector connects the handset of that phone to the portable terminal 96 as shown at 102 in FIG. 9, and then dials the telephone number for connection to the dispatch computer as shown at 103.
  • the telephone number of the dispatch computer advantageously is programmed into the collector's portable terminal, which can outpulse DTMF signals acoustically coupled to the telephone handset of the pay phone.
  • the collector enters the assigned PIN into the portable terminal as shown at 104. That PIN and the terminal serial number or identification internally programmed within the terminal are transmitted to the dispatch computer as shown at 105. That number is transmitted to the dispatcher. The serial number of the portable terminal and the PIN of the collector are compared with information in the dispatch database for verification on that particular date, as shown at 106 and 107, and the attempted access to the coin box of the pay phone is aborted if verification of that information is not forthcoming.
  • the dispatch computer transmits a coded access message over the telephone line connected to the pay phone, as shown at 108.
  • This message is received by the access circuit 97, FIG. 8, and takes the form of DTMF audio pulses for telephone systems presently existing.
  • the access circuit 97 within the pay phone comprises a central processing unit (CPU) and memory similar to the CPU 46 and memory 47 associated with the ATM 10 in the embodiment previously described.
  • This access circuit is programmed to decrypt the access message, if that message was originally transmitted in encrypted form, and compare the "present access code" of that message with the corresponding code previously stored within the access circuit. This step is shown at 110 in FIG. 9. If the access circuit 97 verifies receipt of the proper access code, that circuit sets the switch 93 from its default position shown in FIG. 8A, to the position connecting the solenoid latch 94 to both sides of the telephone line 92a, 92b. At this time, the dispatch computer hangs up as shown at 111 in FIG. 9, breaking the telephone connection to the pay telephone.
  • CPU central processing unit
  • the dispatch computer next immediately redials that pay phone as shown at 112.
  • the telephone company central office sends ringing current on the lines 92a and 92b and this ringing current now passes through the solenoid latch 94 instead of the ringer 91. If the callback fails to occur in a predetermined time after hangup 111, the attempted access aborts as shown at 113 and the switch 93 restores the ringer 91 to default mode connected across the telephone lines.
  • the ringing current thus operates the solenoid latch to unlock the door 130 to the coin box, as shown at 111 allowing the collector to remove the full coin box 131 and replace it with an empty one in accordance with established practice.
  • the access circuit 97 erases the "present access code” previously stored therein, and receives and stores a "next access code” contained in the access message previously received from the dispatch computer, as shown at 116.
  • the access circuit 97 also restores the switch 93 to its default state, reconnecting the ringer 91 across the telephone lines 92a, 92 b to receive ring current the next time this pay phone receives a call.
  • the pay phone access system described herein allows a collector to access the coin boxes of pay phones without carrying any individual keys or master key for the telephones, relying only on the portable terminal and information previously stored at the dispatch computer.
  • coin-box access with the present system is possible only if the present access code stored in the access circuit of the telephone matches the present access code received from the dispatch computer, making it virtually impossible for an enterprising thief to program a personal computer to emulate the functions of the portable terminal carried by the collector.
  • telephone access is obtained only after active participation from the dispatch computer, namely, redialing the pay phone within a short time after authorization and initial hang up.
  • FIGS. 10 and 11 show an alternative embodiment for controlled access to the coin boxes of pay telephones. Moreover, and unlike the pay-telephone embodiment described with reference to FIGS. 8, 8A, and 9, this alternative embodiment can access the coin box of a pay telephone when the telephone line is inoperative or not connected to the pay telephone.
  • the embodiment shown in FIG. 10 does not require the pay phone to originate or receive any calls, and does not add to the traffic load on the telephone system during peak-load daytime hours when pay phone collections usually take place.
  • the pay telephone 127 is modified to contain an access circuit 128 connected to drive a solenoid lock 129 which, when energized, unlocks the door 130 and allows access to the removable coin box 131 contained within the pay telephone.
  • the access circuit 128 does not operate a switch to divert ringing current to the solenoid lock.
  • the access circuit 128 performs many security functions similar to those of the preceding embodiments, as is described below, and that access circuit selectively furnishes the solenoid 129 with operating power obtained from the portable terminal 135 temporarily connected to the pay telephone 127 by a collector.
  • the conventional pay phone 127 thus requires modification to add the access circuit 128, the solenoid lock 129, and a port 136 for establishing data and power transfer between the access circuit 128 and the portable terminal 135.
  • the electrical power required to drive the solenoid lock 129 preferably is obtained from the battery pack associated with the terminal 135; the power required for momentary actuation of the solenoid lock required to unlock the door 130 is well within the capacity of battery packs used on conventional portable terminals, and that momentary power requirement does not significantly reduce the useful lifetime of the battery pack between charges.
  • the portable terminal 135 receives information from a dispatch computer or host computer concerning the telephone numbers and locations of pay telephones scheduled for collection on a given day.
  • the identification number of the authorized portable terminal, the present access code and a future access code for each of those pay telephones, along with the PIN assigned to the particular collector, also are included in the information downloaded to the portable terminal 135.
  • This information can be downloaded to the portable terminal by modem and telephone link to the host computer, as appearing at step 137 in FIG. 11.
  • the collector then travels to a pay telephone set for collection on the particular day and, as shown at 138 in FIG. 11, connects the portable terminal 135 to the port 136 installed at that pay telephone.
  • the collector next enters the known PIN into the terminal 135 as shown at 139 in FIG. 11, where the terminal must confirm that PIN with the encrypted information previously downloaded to the terminal before proceeding further along the access steps.
  • the terminal If the portable terminal 135 confirms the identity of the PIN entered by the collector, the terminal erases that manually-entered PIN as shown at 140 and then transfers to the pay telephone the encoded access message previously downloaded for that particular telephone. That access message is decrypted by a decryption algorithm stored within the access circuit 128, as shown at step 140 in FIG. 11.
  • the decrypted access message includes the telephone number of that particular pay telephone, and that information is compared with the actual number assigned to that telephone and stored in the access circuit 128 to verify that the portable terminal is connected to the correct telephone. This verification is shown at 141 in FIG. 11. If the correct telephone is indicated, the access circuit 128 compares the present access code decrypted from the access message with the present access code previously stored within the access circuit of that telephone.
  • the access circuit 128 closes a connection between the portable terminal 135 and the solenoid lock 129, actuating that lock to unlock the door 135.
  • the collector now opens the door and gains access to the removable coin box 131 within the pay telephone.
  • the access circuit replaces the present access code in the access circuit 128 with a new access code contained in the access message downloaded from the terminal, and sends to the portable terminal 135 selected information about the particular access.
  • This information can include the date and time access was granted, that information being associated within the portable terminal 135 with the phone number of the particular pay telephone being serviced and the PIN identifying the collector.
  • This access information is later uploaded from the portable terminal 135 to the host computer at the dispatch location or elsewhere, as shown at 144 in FIG. 11.
  • the collector after removing the full coin box and replacing it with an empty receptacle, then disconnects the portable terminal 135 from the pay telephone and travels to another pay telephone scheduled for service on that date.
  • the pay-telephone access system described with regard to FIGS. 10 and 11 permits selective and controlled access to the telephone coin box without placing or receiving any telephone message at the pay telephone, and without requiring power from an incoming call or otherwise from the telephone company central office to actuate the unlocking mechanism within the telephone.
  • the present embodiment of controlled-access system thus does not add to the traffic load on the telephone switching system, and increases the speed of access by eliminating the time required for placing the initial call and then awaiting the call-back associated with the embodiment of FIGS. 8 and 9.
  • each of the portable terminals 96 and 135 is optionally equipped with a bar code scanner 148 which operates to read a bar code label 150 on the empty coin box 149 as well as a similar label on the full coin box 131 within the pay telephone.
  • a bar code scanner is known in the art and are commercially available, one example being the Denso Model BHT-2061 terminal made by NippsonDenso Company.
  • this terminal is equipped with a serial port for connection to the port 136 on the pay telephone. The serial port permits data transfer with the access circuit within the pay telephone and supplies operating power to the solenoid lock.
  • the bar code label on each coin box contains, in scanner-readable bar code format, the information printed or written onto the collection stubs presently associated with coin boxes and manually filled in by the collectors.
  • this information includes an identification number of the individual receptacle, the telephone number of the pay phone for which the receptacle is intended, the route and stop numbers at which that telephone is located, the number of the full receptacle which a particular empty receptacle replaces, the time and date of collection, the identification of the collector, and other information as required by the pay-telephone operator.
  • the manual collection stubs presently in use also contain blocks manually checked by the collector when the coin box is overflowing or when larceny is indicated by the condition of the telephone.
  • FIG. 11A illustrates operational steps associated with the bar-code identification of the coin boxes using the scanner 148 associated with the portable terminal 96 shown in FIG. 8 and the portable terminal 135 shown in FIG. 10. It should be understood that the scanner 148 and associated scanning functions outlined in FIG. 11A are optional to the secured access system previously described with reference to FIGS. 10 and 11. Likewise, the operational steps shown in FIG. 11A and associated with the bar code labeling system are in addition to the operational steps shown in FIG. 11 for obtaining access to the coin box within a particular pay telephone.
  • the portable terminal is connected to or otherwise in data communication with a pay telephone and the PIN of the collector is entered as shown at 138 and 139, those steps previously described with respect to FIGS. 9 and 11.
  • the collector selects an empty coin box 149 intended for the particular pay telephone and scans the label 150 on that coin box, using the scanner 148 associated with the portable terminal.
  • This scanning step appears at 156 in FIG. 11A and can take place after access is granted to the particular pay telephone, so that the particular telephone number is associated in the memory of the portable terminal with the identification number obtained by scanning the label on the empty coin box 149.
  • the collector next uses the scanner 148 to scan the bar code label on the full coin box 131 being removed from the pay telephone, as shown at 157 in FIG. 11A.
  • the collector places the empty coin box 149 in the receptacle of the pay telephone and closes the door 130 of the pay telephone, and if necessary selects certain preprogrammed special conditions from the appropriate menu on the portable terminal.
  • These special conditions include overflow of the coin box, indication of larceny, or other service needs indicated by the collector's visual inspection of the pay telephone. This indication of special conditions at 158 in FIG. 11A thus corresponds in function to the check boxes on the stubs now in use and manually filled in by the collectors.
  • the collector After entering any special conditions into the portable terminal, the collector disconnects that terminal from the pay telephone and travels to the next telephone scheduled for collection.
  • the portable terminal stores the coin box and telephone data obtained from each collection, and periodically uploads that data through a modem 152 and dial-up telephone connection to a host computer 162 as indicated at 159 in FIG. 11A.
  • This host computer advantageously is connected to coin sorting and counting equipment 163 located at the coin processing center where the various full coin boxes 131 removed from pay telephones are brought for emptying and counting.
  • This coin sorting and counting equipment 163 is known to those skilled in the art, and preferably is equipped with a bar code scanner 164 for reading the bar code label on each coin box 131 as the contents of that coin box are emptied into the sorting and counting equipment.
  • the coin count from each coin box thus becomes associated with that coin box and with the pay telephone from which that coin box was removed, as shown from information previously uploaded to the host computer 162 from the portable terminal, without manual entry of data by the collector in the field or by others at the coin processing center.

Abstract

A system for authorizing access to a secured device, such as an automated teller machine (ATM) or a pay telephone, without a key or combination for the secured device, and without a fixed communication link extending to the device. An encoded access message is produced which identifies a present access code previously stored at the secured device, the personal identification number (PIN) of a technician, and the identification number of a particular portable terminal. The technician manually enters the encoded access message and a PIN into the terminal, which verifies the identification number of the terminal and the manually-entered PIN against information encoded in the access message. If that information is authenticated, the portable terminal is connected to the secured device. The encoded access message is transferred from the terminal to the secured device, which compares an access code previously stored at that device with information contained in the access message. The proper PIN also is re-entered. Access is granted only if all information is verified by information in the encoded access message. If access is allowed, the access code at the secured device is replaced by a new access code from the encoded access message, and that new access code is stored for the next authorized access to the particular secured device.

Description

CROSS-REFERENCE TO RELATED APPLICATION
This is a continuation-in-part of Ser. No. 07/804,780 filed Dec. 9, 1991 and now abandoned.
FIELD OF INVENTION
This invention relates in general to controlling access to a secured or locked location, and relates in particular to an apparatus and method for providing controlled access by an identification number known only to an authorized person and by an access code known only at the secured location.
BACKGROUND OF THE INVENTION
There are many applications where amounts of money are kept in unmanned facilities that are open to public access. For example, cash-operated devices such as vending machines and pay telephones are available to the public and accrue varying amounts of cash as they dispense goods or services to customers. These machines periodically are serviced to remove the money and, in the case of vending machines, to replenish the supply of products. Persons authorized to service pay telephones or vending machines must carry keys permitting access to the coin box or other receptacle receiving money paid into the machine. Pay telephone coin boxes are serviced by a collector who periodically visits each pay phone. The collector unlocks an outer door to the phone using a key for that purpose, and then removes the coin box from within the phone and substitutes an empty coin box. If the collector is allowed to carry one or more master keys for servicing a number of telephones, the risk of loss by theft or misappropriation of a single key is apparent. On the other hand, requiring the collector to carry a separate key for each pay phone represents a significant inconvenience, particularly in areas such as airport terminals where large numbers of pay phones are located. Furthermore, the risk of loss through theft or misuse of individual keys still exists.
Automated teller machines (ATMs) are another example of machines containing cash and requiring periodic access for replenishing the cash supply or maintaining and repairing the machines. Because ATMs are capable of containing large amounts of money relative to most vending machines, they are more inviting targets for theft. For this reason, the cash within an ATM is contained within a small vault integral with the ATM and typically accessible only through a vault door having a combination lock, sometimes combined with a key access, for opening the vault door. Portions of the electronic controls for the ATM also may be located within the vault to prevent unauthorized cash dispensing by tampering with control circuits. Generally speaking, the cash within a locked ATM is secure from any unauthorized activity short of safecracking.
The need for periodic access to the vault of an ATM machine to replenish the cash supply, or to service equipment within the vault, constitutes a weak link in ATM security. If vault access is available only to technicians possessing the proper key or numerical combination to open the vault door, those technicians are vulnerable to being hijacked and forced to hand over the key or divulge the combination to open the vault. Furthermore, job turnover of ATM technicians makes it impractical to give each technician the combinations of ATM vaults, because of the need to reset those combinations whenever the technician left the job. For the same reason, key-only access to ATM vaults presents a problem when the technician leaves the job, due to the risk that the technician may not return the keys or may make an unauthorized copy of the keys while employed. Further yet, security considerations rule against allowing any technician to carry master keys capable of unlocking the vaults in a number of different ATMs, due to the risk of great loss if such master keys were stolen or otherwise came into the wrong hands.
Prior-art techniques are known for providing keyless access to ATMs or other machines containing significant amounts of cash. These techniques generally require an electronic link between the machine and a central office, and an arrangement for unlocking the vault whenever the proper signal arrives from the central office. To avoid the cost of providing dedicated lines between the central office and a great number of ATMs, these prior-art techniques usually rely on the public telephone network and a modem associated with each ATM, in order to communicate between the central office and a selected ATM. While these techniques relieve the service technician of the need to carry either access keys or combinations for the ATM vaults, it still leaves the technician subject to being hijacked by robbers who will then coerce the technician to request access from the central office. On a more sophisticated level, the use of conventional telephone lines for transmitting access signals to ATMs makes those signals subject to interception by wiretapping, leading to the fear that the access signals may be analyzed and then used by others for unauthorized access to ATM vaults. Moreover, the dial-up telephone line required for each ATM is an ongoing expense to the bank or other agency sponsoring the ATM.
SUMMARY OF INVENTION
Stated in general terms, a call for service or repair of an ATM or another secured device is reported to a service technician, along with a unique encoded access message generated for the particular occasion. The technician can receive this access message by telephone or radio dispatch, because the information contained therein is encrypted so as to conceal the information. This access message contains the personal identification number (PIN) identifying that particular technician, the serial number or other unique identifier of the particular portable terminal, present and future access codes for the secured device, and other information appropriate for a particular application, all as encrypted in the encoded access message. The technician carries a portable terminal and enters the access message into that terminal along with a PIN, and the portable terminal verifies access message was entered in the correct terminal and that the proper PIN was used. The technician then travels to the location of the ATM or other device requiring service. At that location, the technician connects the portable terminal to the secured device and once again enters the PIN into the terminal, where that number again is verified against the access code previously contained in the encoded access message. This double verification of the technician's PIN thwarts unauthorized access in a situation where the technician is hijacked after receiving a service call from the dispatcher and then entering the proper PIN into the portable terminal for self-authentication. With the portable terminal connected to the secured device, the encoded message is sent to the device where a computer checks for the presence of correct information identifying the device and authenticating the access being requested, and allows access to the vault only if that correct information is present.
Because the PIN assigned to the particular technician is among the information contained in the encoded access message initially furnished to the technician, the present system accommodates the departure of a technician simply by retiring that person's PIN number from further use and assigning new numbers for new technicians. Any unauthorized interception of an access message thereafter by a former technician will fail, even if intercepted by someone possessing a portable terminal obtained by theft or fraud, because the serial number of that terminal will not match the corresponding number in the encoded access message and because that person does not know the new PIN for use by someone else and encoded into the access message.
Stated somewhat more particularly, the encoded access message transmitted to the technician according to the present invention includes a present access code for gaining access to the secured location at the present time, in addition to the PIN for the technician authorized for that access. This present access code must correspond to an access code previously stored at the secured location, or else the system will deny the present attempt to gain access to the secured location. The encoded access message also contains a new access code intended for future use by that particular secured location. If the PIN entered by the technician matches the PIN encoded in the access message and if the present access code within that message matches the access code previously stored at the secured location, then access is granted and that present access code is erased and replaced by the new access code contained in the encoded message. This new access code remains stored at the secured location and becomes the authorized access code for use the next time access to that location is sought. In this manner, each access code is used only one time and anyone attempting to create an encoded access message for a particular location must have present knowledge not only of that location, the authorized PIN for a particular technician, and the serial number of the particular portable terminal authorized for that technician, but must also know the access code previously stored at that secured location. Without this specific information, and other information as may be appropriate and as described further herein, an attempt to counterfeit an encoded access message will fail. Each present access code preferably is unique to a particular secured location and may be based on a randomly-generated number, so that the likelihood of duplicating that number by chance becomes so low as to be negligible in practice. The ATM can maintain a historical file of all attempts to access the vault, whether granted or disallowed. If a loss occurs, one can consult the historical file for preloss activity. This information may also predict problems arising from repeated attempts to access the vault.
Accordingly, it is an object of the present invention to provide an improved apparatus and method for controlling access to a secured location.
It is another object of the present invention to provide an improved apparatus and method for controlled access to automated teller machines.
It is a further object of the present invention to provide the capability of selective access to a secured location without requiring a telephone line or other data link between that location and a central office.
It is still another object of the present invention to provide an apparatus and method for authorized access to a locked location without requiring either a key or the combination for a lock, or by requiring a level of security in addition thereto.
It is yet another object of the present invention to provide an improved apparatus and method for selective access to the coin box of a pay telephone or the like.
Other objects and advantages of the present invention will become more readily apparent from the following disclosure of a preferred embodiment.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a schematic view illustrating the flow of information required for gaining access to a secured location according to a first preferred embodiment of the present invention.
FIG. 2 represents the information contained in an encoded access message according to the first embodiment.
FIGS. 3 and 3A are pictorial views illustrating a portable terminal used in the first embodiment.
FIG. 4 is a block diagram illustrating components of the portable terminal and interfacing components of an ATM, in the first embodiment.
FIG. 5 is a perspective view showing the access latch mechanism according to the preferred embodiment.
FIG. 6 is a fragmentary elevation view of the latch mechanism shown in FIG. 5.
FIG. 7 is a flow chart illustrating operational steps in the method of the first embodiment.
FIG. 8 is a block diagram of apparatus for controlled access to the coin box of a pay telephone according to a second preferred embodiment of the present invention.
FIG. 8A is a schematic diagram of a pay telephone circuit according to the second embodiment.
FIG. 9 is a flow chart illustrating operational steps of the second embodiment.
FIG. 10 is a block diagram of a pay telephone coin box access apparatus according to a third preferred embodiment of the invention.
FIG. 11 is a flow chart illustrating operational steps of the third embodiment.
FIG. 11A is a flow chart illustrating operational steps of the bar-code scanning option disclosed with regard to the second and third embodiments.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENT
FIG. 1 shows a functional outline of a secured access system according to a preferred embodiment of the present invention. This secured access system includes at least one secured location 10, such as an ATM or other apparatus having a vault or other secured enclosure normally kept locked and inaccessible persons. In actual practice, systems utilizing the present invention are associated with a number of separate secured locations, such as the ATMs belonging to a particular bank or located in a particular area. A number of these secured locations 10 are serviced by one or more technicians 11 in response to instructions received from a dispatcher 12 at a central location. Each technician 11 carries a portable computer terminal 13 which may be a conventional hand-held terminal programmed to function as pointed out below in greater detail.
The dispatcher 12 receives information as indicated by the line 16, concerning problems with a secured location 10. These reports may be relayed from the bank or other institution that operates or sponsors the secured locations, or alternatively may come directly from the secured locations themselves by way of telephone links reporting a problem at the secured location. Upon receiving a problem report concerning a particular secured location 10, the dispatcher 12 obtains from the dispatch computer 17 an encoded access message that a selected technician 11 must use to gain access to that particular secured location. This access message contains various information as pointed out below in greater detail, including information identifying the present access code previously stored at that location, the PIN of the particular technician 11 selected by the dispatcher to visit the secured location, and the serial number of the portable terminal 13 assigned to that particular technician. It should be understood that the foregoing information preferably is contained in a database maintained at the dispatch computer 17. The dispatch computer 17, at the request of the dispatcher 12, generates a number containing the foregoing access information in encoded form. This number thus becomes an encoded access message which the dispatcher 12 can send to the technician 11 over an open link 18, such as a telephone line or radio dispatch communication, without concern that unauthorized interception of the encoded access message will yield any useful information to anyone lacking the proper terminal 13 and the PIN of the technician.
The technician 11, upon learning from the dispatcher 12 that a particular secured location 10 requires attention and receiving the encoded access message for that particular job, manually enters that access message into the portable terminal 13. The technician also enters his or her assigned PIN into the portable terminal 13. The portable terminal compares its own serial number or other internal identification number with the known serial number of the terminal assigned to the particular technician 11, as based on information within the database of the dispatch computer 17, to confirm that the access information was entered into the proper portable terminal. The manually-entered PIN also is compared with the PIN encoded in the manually-entered access message to make certain those PINs match; the portable terminal preferably is programmed to erase the entire encoded access message at this time, if the PIN manually entered by the technician does not match the PIN information contained within the encoded access message received from the dispatcher 18. This erasure of the access message aborts the access procedure without recourse, so that a hijacked terminal 13 cannot thereafter be disassembled and the internal memory electronically read by a technically-sophisticated thief in an effort to retrieve the encoded access message from the portable terminal.
After the portable terminal 13 verifies it is the proper terminal indicated in the encoded access message and that the proper PIN was entered, the technician then travels with the terminal 13 to the secured location 10. At that location, the technician connects the portable terminal 13 to the ATM or other apparatus at the second location, whereupon the portable terminal transfers to the secured location the encoded access message that the technician previously received from the dispatcher and entered into the portable terminal. At this time the technician must again enter his PIN into the portable terminal, where that number again must match the PIN encoded in the access message. The computer within the secured location also compares the serial number of the portable terminal 13 with the terminal serial number within the encoded message, to confirm that the terminal connected to the secured location is in fact the terminal assigned to the particular technician based on information within the encoded access message.
As a further check on the integrity of the encoded access message and the authenticity of the access being sought, a "present access code" previously stored at the location 10 is compared with a present access code within the encoded access message and obtained from the database of the dispatch computer 17. If those present access codes match, the vault door or other access port at the secured location is released, allowing access by the technician 11 for service or maintenance. The secured location at this time may return information to the still-connected portable terminal 13 indicating that access was granted, together with the date and time this access began and ended. The technician 11 can later upload that access-related information from the portable terminal 13 to the dispatch computer 17, thereby providing the dispatcher 12 with an historical record of telling when and by whom various secured locations 10 were accessed.
If the incorrect PIN is entered into the portable terminal 13 when connected to the secured location 10, an alarm signal is optionally provided along the line 21 to an alarm 22. This alarm 22 preferably is an off-site alarm located remotely from the secured location 10, with the alarm transmitted along a telephone line or radio link represented by the line 21 to alert the police or other authorities about a possible unauthorized attempt to gain entry, to protect the safety of a hijacked technician forcibly detained at the secured location 10.
The information contained in the encoded access message used with the preferred embodiment of the present invention is shown in FIG. 2. That information includes the PIN 26 identifying the particular technician 11 dispatched for a service call to an ATM, and the serial number 27 of the portable terminal 13 assigned to that technician. The encoded access message also contains the present access code 28 corresponding to an access code previously stored at the ATM in question, and the "next access code" 29 that replaces the present access code at the ATM upon successful authorization of the present access. Although not included in the particular access message of the preferred embodiment, the access message can include other information relevant to security, such as an ATM code identifying the particular ATM to which the technician 11 has been dispatched, and the date and time of this particular service request. A check sum digit 32 may also be incorporated into the information contained in the encoded access message, as is known to those skilled in the art. The information contained in the access message as illustrated in FIG. 2 is encoded by appropriate known public encryption algorithms such as the Data Encryption Standard (DES), which is widely documented and has been accepted by the banking industry for electronic information exchange. Encryption and decryption of information as used herein thus is within the skill of the art. The actual encoded access message delivered by the dispatcher 12 to the technician 11 thus consists, for example, of a 12-digit string having no humanly-perceptable relation to the information depicted in FIG. 2. That 12-digit string is subsequently decoded by software within the portable terminal 13 and within the secured location 10 after the encoded access message is transferred to that location.
A portable terminal 13 used in the preferred embodiment of the present invention is shown in FIG. 3, and the major operational components of that terminal are depicted in FIG. 4. The portable terminal 13 includes a keyboard 36 connected to a central processing unit (CPU) 37, which in turn drives a display 38. A memory 39 is connected to the CPU and contains stored programming to perform the operational steps as described below. As seen in FIGS. 3 and 3A, the display 38 comprises a flat LCD panel which in that figure displays an alphanumeric keypad and also displays the command "Enter PIN:" 40 at the upper-left corner of the panel. The electrical contacts of the keyboard 36 are situated beneath the flat panel display 38, which is sufficiently flexible or otherwise responsive to the finger pressure of a person entering an alpha/numeric PIN and then pressing the "Enter" key 41 appearing at the lower-right corner of the display 38 in FIG. 3.
Portable terminals suitable for use with the present invention are obtainable from various sources. The programming of such terminals is well known to those of ordinary skill of the art and need not be further described herein. The programming code to perform the steps described herein preferably is stored in battery-powered RAM within the terminal, so that the programming is electronically erasable in the event of tampering with the terminal. The alpha/numeric keyboard and menu display 39 generated on the display 38 of the portable terminal 13, as shown in FIG. 3, is selectively replaceable by a programmed message display, such as the message "ADMISSION GRANTED" shown on the display 38 in FIG. 3A.
A cable 44 extends from the portable terminal 13 for connecting that terminal to an RS-232 port at the ATM or other secured location 10, as depicted in FIG. 4. The cable 44 provides a interface for transferring data between the CPU 37 of the portable terminal 13 and the CPU 46 forming part of the present apparatus at the secured location 10, although those skilled in the art will understand that other data-transfer techniques can be substituted for the cable. That secured location 10 further includes a memory 47 associated with the CPU in the conventional manner. An output from the CPU 46 is connected via the signal line 48 to selectably drive a solenoid latch 49 when admission to the secured location 10 is granted. The CPU 46 at the secured location 10 optionally provides a signal on the line 21 leading to the silent alarm which, if present as previously mentioned, can indicate an unauthorized access such as entry of the wrong PIN or deliberate entry of a PIN previously chosen to alert others that an emergency exists at the secured location.
FIGS. 5 and 6 show the inside of a vault door 52 modified according to the present invention. The vault door 52 is of a kind typically used in ATMs and is shown opened in FIG. 5. This vault door includes a locking bolt 55 in the form of heavy steel plate extending parallel to the open edge 54 of the vault door. The locking bolt 55 slides within the fixed sleeve 53 along one side thereof adjacent the door edge 54. The locking bolt 55 thus is supported to move laterally from its unlocked position shown in FIG. 5, leftward as indicated by the arrow 56 to a locked position in which the locking bolt engages mating structure (not shown) adjacent the open portal of the vault to retain the vault door shut in the portal.
The locking bolt 55 is moved between open and closed positions by rotating the conventional handle 59 located on the front side of the door 52. The handle 59 rotates the lever 60 on the inside of the vault door, imparting lateral movement to the locking bolt 55 through a pin and link connection to the lever. The combination lock and/or key lock conventionally used with the handle 59 are omitted herein for clarity.
A bar 63 is attached at one end to the locking bolt 55 and extends perpendicular to that locking bolt, as best seen in FIG. 6. The bar 63 thus moves with the locking bolt 55 as that bolt is moved laterally by operation of the handle 59. The solenoid latch 49 is mounted on the inside of the door 52 at one side of the bar 63, so that the solenoid armature 64 extends toward the bar. A spring 65 is concentric with the solenoid armature 64 and biases that armature in a direction toward the bar 63.
An opening 68 sized to receive the free end of the solenoid armature 64 extends through the bar 63. This opening 68 is positioned on the bar 63 in relation to the armature 64 so that the opening becomes aligned with the armature only when the locking bolt 55 of the vault door 52 is moved leftwardly, as indicated by the arrow 56 in FIG. 5, to the locked position. In that locked position, the spring 65 forces the solenoid armature 64 upwardly to enter the opening 68 and lock the bar 63 in position as shown in FIG. 6. This engagement of the bar 63 by the bolt 64 thus effectively prevents withdrawing the locking bolt 55 from its locked position by movement of the handle 59, unless the solenoid 49 is energized to withdraw the armature from engagement with the bar 63.
The operation of the preferred embodiment is now described with regard to the flowchart, FIG. 7, representing the functional steps programmed to accomplish the method. The depicted process assumes that access to a particular ATM has been requested. As previously mentioned, this service request commences according to the disclosed embodiment when a dispatcher learns that a particular ATM requires maintenance or service. The dispatcher selects a particular technician for the job, and then enters the identification of the ATM and that technician into the dispatch computer 17 (FIG. 1) which obtains from its database the required information including the PIN of the selected technician, the serial number of the portable terminal assigned to that technician, the present access code previously stored in ATM, and other information as shown in FIG. 2. The computer then encrypts that information, producing a 12-digit encoded access message in the present embodiment as shown at 70 in FIG. 7. The dispatcher then tells the technician the location of the ATM requiring service and announces the 12-digit encoded access message.
Upon receiving this message, the technician manually enters the 12-digit access message into the portable terminal 13 using the keyboard 36 for that purpose, as indicated at step 71 in FIG. 7. The portable terminal 13 decrypts the encoded access message as shown at 72 and then compares the terminal serial number 27 (FIG. 2) contained in the access message with the actual serial number programmed into that terminal, as shown at 73 in FIG. 7. If those serial numbers do not match, the terminal 13 aborts the access attempt at that time and displays an appropriate message for the technician on the display 38 of the portable terminal. This aborted access safeguards against access attempts using a terminal obtained by theft or remaining in the possession of a former technician no longer authorized for access to an ATM.
If the terminal serial number matches in step 73, the terminal then prompts the technician as shown at 40, FIG. 3, to enter his PIN into the terminal. This step is shown at 74 in FIG. 7. The terminal then compares the manually-entered PIN with the technician's authorized PIN 26 (FIG. 2) contained in the encoded access message. If those PINs don't match, the terminal prompts the technician to re-enter the PIN at the keyboard. However, if three repeated attempts to enter the technician's PIN produce no match, the terminal 13 aborts the access attempt and erases the entire encoded access message as shown at 75 in FIG. 7. In this way, anyone who steals or hijacks a technician's portable terminal 13 and then intercepts instructions from the dispatcher, including the 12-digit access message, is thwarted in repeated attempts to guess the proper PIN. Moreover, in that situation the terminal effectively forgets the 12-digit number previously keyed into it, making it impossible to retrieve that number by disassembling the terminal and examining the logic states of the memory or CPU within.
Once the technician enters the correct PIN at step 76, the terminal 13 displays a message acknowledging that entry and then erases the manually-entered PIN from its memory. This erasure of the PIN, shown at 77, provides another level of security, as that PIN cannot be determined by electronic inspection of a terminal hijacked from a technician after entry of the proper PIN. The terminal then re-encrypts the access message using a second encryption algorithm different from the first such algorithm for an added level of security, as shown at step 78 in FIG. 7.
After the technician has entered the proper PIN into the terminal 13 as discussed above, the technician travels to the location of the ATM and connects the terminal 13 to the CPU 46 of the ATM, using the cable 44 for that purpose as illustrated in FIG. 4. The technician then re-enters the PIN as shown at 79 into the portable terminal, which must reconfirm that the proper PIN is presented as shown at 80. This occurs after the re-encrypted access message is transferred to the CPU 46 in the ATM, as shown at 81 in FIG. 7. Where the access message is decrypted by that CPU. At this time, the present access code 28, contained within the access message, is compared at 82 with the present access code previously stored in memory 47 at the ATM. If these access codes don't match, the attempted access is aborted at that point as indicated at 83 in FIG. 7.
If the proper access code, the proper PIN, and the proper ATM are confirmed, the re-entered PIN is compared with an alarm PIN as shown at step 84. If that PIN previously re-entered at step 79 matches the alarm PIN contained within the encoded access message, the system performs certain alarm functions as previously discussed. Otherwise, access to the ATM is allowed as indicated at 85, FIG. 7. The CPU 46 at the ATM accomplishes this access by sending a signal along line 48 to activate the solenoid 49, FIGS. 5 and 6, withdrawing the armature 64 of the solenoid from the opening 68 in the bar 63 connected to the locking bolt 55 of the vault door. The technician can then rotate the handle 59 to withdraw the locking bolt 55 from engagement with its receptacle in the vault, thereby unlocking the door for access to the vault.
After access is allowed at step 85, the present access code previously stored within memory 47 at the ATM is erased as shown at 89 and replaced with the next access code 29 contained in the encoded access message. This next access code remains in memory 47 and in effect becomes a new "present access code" for this particular ATM. After the access code is updated at the ATM, both access codes are erased in the portable terminal as shown at 90. As previously mentioned, the next access code 27 also is stored at the dispatch computer 17. The next time access to this particular ATM is required, the dispatch computer 17 will generate a new encoded access message in which the current "next access code" 29 will become the "present access code" for that new access message. This updating of the access message stored at the ATM or other secured location 10 is a significant aspect of the present invention, because each authorized access to the ATM automatically updates the access code required for the next access to that ATM. No subsequent access to the ATM is possible without that updated access code, which is known only in memory 47 within the particular ATM and at the dispatch computer 17. The CPU 46 associated with the ATM 10 initially includes a default access code which is used (and then replaced) for the initial access to the vault. This default access code may be set by jumper connectors attached to a circuit board and removed when the system is initialized. The CPU 46 and memory 47 preferably have a battery backup power source to prevent memory loss during power outages.
Once access to the ATM is completed, information concerning that access is transferred to the terminal 13 from the CPU 46 associated with the ATM. This access information can include verification that access was allowed, the date and time of such allowance, and the time that the access was terminated, i.e., that the technician closed and relocked the vault door 52. The technician periodically uploads this access information from the portable terminal 13 to the dispatch computer 17, either by directly connecting the portable terminal to the dispatch computer or by dial-in telephone link as appropriate to the particular work patterns of the system. This information allows the dispatcher to maintain a database showing the workload of each technician, including the response time for each service call and the time elapsed while the vault door of each ATM remained open. As mentioned above, the access information also can include the date, time, and disposition of all attempts to access, the PINs and terminal serial numbers employed with those attempts, and other relevant date possibly indicating unauthorized activity at that location.
Modifications to the program access steps shown in FIG. 7 are permissible. For example, after a technician has gained access to the vault, he may find that a particular replacement part or service tool is required from the service vehicle. Security procedure requires that the technician must not leave the open vault unattended, but locking the vault door otherwise will require reinitiating the access authorization procedure shown in FIG. 7. However, once access has been allowed as shown at step 85 in that procedure, the program can be modified to allow the technician to close and relock the vault door but leave the terminal 13 connected to the ATM while obtaining the desired component from the service vehicle. Upon returning to the ATM, the technician merely re-enters the PIN into the terminal 13, whereupon the solenoid latch 49 is again activated to unlock the vault door if the proper PIN was entered.
FIGS. 8, 8A, and 9 show an embodiment intended for use in controlling access to the coin boxes of pay telephones. As shown in FIGS. 8 and 8A, a typical pay telephone 89 includes a ringer 91 connected in parallel across the sides 92a, 92b of the telephone line 92 connecting the pay telephone to the telephone central office in the conventional manner. However, the ringer circuit is modified according to the present invention so that the side of ringer 91 connected to the line 92a passes through the switch 93 having a default condition connecting line 92a to the ringer, as shown in FIG. 8A. Actuating the switch 93 in response to the access circuit 97, as explained below, removes the line 92a from the ringer and instead connects that line to one side of the solenoid lock 94. The other side of the solenoid lock 94 is connected to the line 92b. Thus, when the switch 93 is diverted from its default position shown in FIG. 8, ringing current from the central office is received by the solenoid lock 94 instead of the ringer 91.
The switch 93 is under operational control of the access circuit 97 connected across the telephone lines 92a and 92b, which extend beyond the access circuit for connection with the conventional dialing, speech, and coin-control equipment forming part of the pay telephone. The access circuit 97, which in practice is disposed on a circuit board mounted within the pay telephone, contains a processor programmed to store a predetermined access code, to compare that stored access code with a present access code received over the telephone line 92a, 92b, and to temporarily set the switch 93 so that ringing current from the telephone central office is temporarily diverted from the ringer 91 to the solenoid 94. The processor within the pay telephone also decrypts the access information received from the portable terminal and the central office, if that information is initially encrypted. With the switch 93 thus set by the access circuit 97, the solenoid lock 94 is activated by ringing current from the central office the next time this particular pay phone is called. The solenoid lock 94 thus unlocks the outer door 130 enclosing the coin box 131 of the phone, enabling the collector to service the coin box without using a key.
The operational program used in connection with the present pay-telephone access system is shown in FIG. 9. It should be understood that a collector servicing pay phones equipped according to the present invention carries a portable terminal 96 equivalent to the terminal 13 described hereinabove. However, portable terminals for pay-phone access preferably include or are modified to include an acoustic coupler for establishing audio communication with the existing handset 98 of the pay telephone. Before the collector sets out on a route to service particular phones on a given day, the telephone numbers of those phones are entered into a dispatch computer along with the PIN assigned to the particular collector, the serial number of the portable terminal carried by that collector, and the particular date for collection from those phones. That information is downloaded to the portable terminal as shown at step 101 in FIG. 9, and the collector then travels to the first phone for that day.
As the collector visits each pay phone chosen for collection on a particular day, the collector connects the handset of that phone to the portable terminal 96 as shown at 102 in FIG. 9, and then dials the telephone number for connection to the dispatch computer as shown at 103. It will be evident that the telephone number of the dispatch computer advantageously is programmed into the collector's portable terminal, which can outpulse DTMF signals acoustically coupled to the telephone handset of the pay phone.
Once telephone communication is established between the particular pay phone and the dispatch computer, the collector enters the assigned PIN into the portable terminal as shown at 104. That PIN and the terminal serial number or identification internally programmed within the terminal are transmitted to the dispatch computer as shown at 105. That number is transmitted to the dispatcher. The serial number of the portable terminal and the PIN of the collector are compared with information in the dispatch database for verification on that particular date, as shown at 106 and 107, and the attempted access to the coin box of the pay phone is aborted if verification of that information is not forthcoming.
Once the collector's PIN and the terminal identification are verified, the dispatch computer transmits a coded access message over the telephone line connected to the pay phone, as shown at 108. This message is received by the access circuit 97, FIG. 8, and takes the form of DTMF audio pulses for telephone systems presently existing.
The access circuit 97 within the pay phone comprises a central processing unit (CPU) and memory similar to the CPU 46 and memory 47 associated with the ATM 10 in the embodiment previously described. This access circuit is programmed to decrypt the access message, if that message was originally transmitted in encrypted form, and compare the "present access code" of that message with the corresponding code previously stored within the access circuit. This step is shown at 110 in FIG. 9. If the access circuit 97 verifies receipt of the proper access code, that circuit sets the switch 93 from its default position shown in FIG. 8A, to the position connecting the solenoid latch 94 to both sides of the telephone line 92a, 92b. At this time, the dispatch computer hangs up as shown at 111 in FIG. 9, breaking the telephone connection to the pay telephone.
The dispatch computer next immediately redials that pay phone as shown at 112. In response to this redialing, the telephone company central office sends ringing current on the lines 92a and 92b and this ringing current now passes through the solenoid latch 94 instead of the ringer 91. If the callback fails to occur in a predetermined time after hangup 111, the attempted access aborts as shown at 113 and the switch 93 restores the ringer 91 to default mode connected across the telephone lines. The ringing current thus operates the solenoid latch to unlock the door 130 to the coin box, as shown at 111 allowing the collector to remove the full coin box 131 and replace it with an empty one in accordance with established practice. The access circuit 97 at this time erases the "present access code" previously stored therein, and receives and stores a "next access code" contained in the access message previously received from the dispatch computer, as shown at 116. The access circuit 97 also restores the switch 93 to its default state, reconnecting the ringer 91 across the telephone lines 92a, 92 b to receive ring current the next time this pay phone receives a call.
The pay phone access system described herein allows a collector to access the coin boxes of pay phones without carrying any individual keys or master key for the telephones, relying only on the portable terminal and information previously stored at the dispatch computer. However, coin-box access with the present system is possible only if the present access code stored in the access circuit of the telephone matches the present access code received from the dispatch computer, making it virtually impossible for an enterprising thief to program a personal computer to emulate the functions of the portable terminal carried by the collector. Moreover, telephone access is obtained only after active participation from the dispatch computer, namely, redialing the pay phone within a short time after authorization and initial hang up.
FIGS. 10 and 11 show an alternative embodiment for controlled access to the coin boxes of pay telephones. Moreover, and unlike the pay-telephone embodiment described with reference to FIGS. 8, 8A, and 9, this alternative embodiment can access the coin box of a pay telephone when the telephone line is inoperative or not connected to the pay telephone. The embodiment shown in FIG. 10 does not require the pay phone to originate or receive any calls, and does not add to the traffic load on the telephone system during peak-load daytime hours when pay phone collections usually take place.
Turning first to FIG. 10, the pay telephone 127 is modified to contain an access circuit 128 connected to drive a solenoid lock 129 which, when energized, unlocks the door 130 and allows access to the removable coin box 131 contained within the pay telephone. Unlike the access circuit 97 in the embodiment of FIG. 8, the access circuit 128 does not operate a switch to divert ringing current to the solenoid lock. However, the access circuit 128 performs many security functions similar to those of the preceding embodiments, as is described below, and that access circuit selectively furnishes the solenoid 129 with operating power obtained from the portable terminal 135 temporarily connected to the pay telephone 127 by a collector. The conventional pay phone 127 thus requires modification to add the access circuit 128, the solenoid lock 129, and a port 136 for establishing data and power transfer between the access circuit 128 and the portable terminal 135. The electrical power required to drive the solenoid lock 129 preferably is obtained from the battery pack associated with the terminal 135; the power required for momentary actuation of the solenoid lock required to unlock the door 130 is well within the capacity of battery packs used on conventional portable terminals, and that momentary power requirement does not significantly reduce the useful lifetime of the battery pack between charges.
Operation of the embodiment as thus far described with respect to FIG. 10 is now described with reference to FIG. 11. As with the portable terminal 96 used for pay-telephone access in the embodiment of FIG. 9, the portable terminal 135 receives information from a dispatch computer or host computer concerning the telephone numbers and locations of pay telephones scheduled for collection on a given day. The identification number of the authorized portable terminal, the present access code and a future access code for each of those pay telephones, along with the PIN assigned to the particular collector, also are included in the information downloaded to the portable terminal 135. This information can be downloaded to the portable terminal by modem and telephone link to the host computer, as appearing at step 137 in FIG. 11.
The collector then travels to a pay telephone set for collection on the particular day and, as shown at 138 in FIG. 11, connects the portable terminal 135 to the port 136 installed at that pay telephone. The collector next enters the known PIN into the terminal 135 as shown at 139 in FIG. 11, where the terminal must confirm that PIN with the encrypted information previously downloaded to the terminal before proceeding further along the access steps.
If the portable terminal 135 confirms the identity of the PIN entered by the collector, the terminal erases that manually-entered PIN as shown at 140 and then transfers to the pay telephone the encoded access message previously downloaded for that particular telephone. That access message is decrypted by a decryption algorithm stored within the access circuit 128, as shown at step 140 in FIG. 11. The decrypted access message includes the telephone number of that particular pay telephone, and that information is compared with the actual number assigned to that telephone and stored in the access circuit 128 to verify that the portable terminal is connected to the correct telephone. This verification is shown at 141 in FIG. 11. If the correct telephone is indicated, the access circuit 128 compares the present access code decrypted from the access message with the present access code previously stored within the access circuit of that telephone. If these access codes match as shown at 142, the access circuit 128 closes a connection between the portable terminal 135 and the solenoid lock 129, actuating that lock to unlock the door 135. The collector now opens the door and gains access to the removable coin box 131 within the pay telephone.
With access thus authorized at the particular pay telephone, the access circuit replaces the present access code in the access circuit 128 with a new access code contained in the access message downloaded from the terminal, and sends to the portable terminal 135 selected information about the particular access. This information can include the date and time access was granted, that information being associated within the portable terminal 135 with the phone number of the particular pay telephone being serviced and the PIN identifying the collector. This access information is later uploaded from the portable terminal 135 to the host computer at the dispatch location or elsewhere, as shown at 144 in FIG. 11. The collector, after removing the full coin box and replacing it with an empty receptacle, then disconnects the portable terminal 135 from the pay telephone and travels to another pay telephone scheduled for service on that date.
It will thus be seen that the pay-telephone access system described with regard to FIGS. 10 and 11 permits selective and controlled access to the telephone coin box without placing or receiving any telephone message at the pay telephone, and without requiring power from an incoming call or otherwise from the telephone company central office to actuate the unlocking mechanism within the telephone. The present embodiment of controlled-access system thus does not add to the traffic load on the telephone switching system, and increases the speed of access by eliminating the time required for placing the initial call and then awaiting the call-back associated with the embodiment of FIGS. 8 and 9.
Referring once again to FIGS. 8 and 10, it is seen that each of the portable terminals 96 and 135 is optionally equipped with a bar code scanner 148 which operates to read a bar code label 150 on the empty coin box 149 as well as a similar label on the full coin box 131 within the pay telephone. Such portable terminals including a bar code scanner are known in the art and are commercially available, one example being the Denso Model BHT-2061 terminal made by NippsonDenso Company. When used with the embodiment shown in FIG. 10, this terminal is equipped with a serial port for connection to the port 136 on the pay telephone. The serial port permits data transfer with the access circuit within the pay telephone and supplies operating power to the solenoid lock.
The bar code label on each coin box contains, in scanner-readable bar code format, the information printed or written onto the collection stubs presently associated with coin boxes and manually filled in by the collectors. As known to those skilled in the art, this information includes an identification number of the individual receptacle, the telephone number of the pay phone for which the receptacle is intended, the route and stop numbers at which that telephone is located, the number of the full receptacle which a particular empty receptacle replaces, the time and date of collection, the identification of the collector, and other information as required by the pay-telephone operator. The manual collection stubs presently in use also contain blocks manually checked by the collector when the coin box is overflowing or when larceny is indicated by the condition of the telephone.
At the present time, some of the foregoing information is preprinted on the collection stubs and attached to each empty coin box, and the remaining information is manually entered by the collector when each full coin box is removed from a pay telephone. Those manual stubs are returned to the coin processing center along with the full coin boxes, where the manually-entered information must then be keyed into a computer for correlation with the coin boxes and the count of money contained in each box. By containing all the foregoing information on a bar code label affixed to each coin box, the collection process is significantly speeded and errors in manual entry of date and time information by the collector are eliminated.
FIG. 11A illustrates operational steps associated with the bar-code identification of the coin boxes using the scanner 148 associated with the portable terminal 96 shown in FIG. 8 and the portable terminal 135 shown in FIG. 10. It should be understood that the scanner 148 and associated scanning functions outlined in FIG. 11A are optional to the secured access system previously described with reference to FIGS. 10 and 11. Likewise, the operational steps shown in FIG. 11A and associated with the bar code labeling system are in addition to the operational steps shown in FIG. 11 for obtaining access to the coin box within a particular pay telephone.
Referring now to FIG. 11A, the portable terminal is connected to or otherwise in data communication with a pay telephone and the PIN of the collector is entered as shown at 138 and 139, those steps previously described with respect to FIGS. 9 and 11. The collector then selects an empty coin box 149 intended for the particular pay telephone and scans the label 150 on that coin box, using the scanner 148 associated with the portable terminal. This scanning step appears at 156 in FIG. 11A and can take place after access is granted to the particular pay telephone, so that the particular telephone number is associated in the memory of the portable terminal with the identification number obtained by scanning the label on the empty coin box 149. The collector next uses the scanner 148 to scan the bar code label on the full coin box 131 being removed from the pay telephone, as shown at 157 in FIG. 11A. The collector then places the empty coin box 149 in the receptacle of the pay telephone and closes the door 130 of the pay telephone, and if necessary selects certain preprogrammed special conditions from the appropriate menu on the portable terminal. These special conditions, as indicated at step 158 in FIG. 11A, include overflow of the coin box, indication of larceny, or other service needs indicated by the collector's visual inspection of the pay telephone. This indication of special conditions at 158 in FIG. 11A thus corresponds in function to the check boxes on the stubs now in use and manually filled in by the collectors.
After entering any special conditions into the portable terminal, the collector disconnects that terminal from the pay telephone and travels to the next telephone scheduled for collection. The portable terminal stores the coin box and telephone data obtained from each collection, and periodically uploads that data through a modem 152 and dial-up telephone connection to a host computer 162 as indicated at 159 in FIG. 11A. This host computer advantageously is connected to coin sorting and counting equipment 163 located at the coin processing center where the various full coin boxes 131 removed from pay telephones are brought for emptying and counting. This coin sorting and counting equipment 163 is known to those skilled in the art, and preferably is equipped with a bar code scanner 164 for reading the bar code label on each coin box 131 as the contents of that coin box are emptied into the sorting and counting equipment. The coin count from each coin box thus becomes associated with that coin box and with the pay telephone from which that coin box was removed, as shown from information previously uploaded to the host computer 162 from the portable terminal, without manual entry of data by the collector in the field or by others at the coin processing center.
It should also be understood that the foregoing relates only to a preferred embodiment of the present invention, and that numerous changes and modifications therein may be made without departing from the spirit and scope of the invention as defined in the following claims.

Claims (24)

What is claimed is:
1. A method for allowing access to a secured location, comprising the steps of:
generating a signal containing encoded information identifying an access code only for a particular secured location and an identification number for a particular person authorized to access that location;
the access code in the encoded information being a present access code;
the encoded information also containing a new access code for the next authorized access to the secured location;
entering that encoded information into a portable terminal carried by the person seeking access to the secured location;
transferring the portable terminal with the entered encoded information to the secured location;
comparing the present access code in the encoded information with an access code previously stored at the secured location to verify that the access code in the encoded information is the same as the access code at the secured location;
comparing the identification number in the encoded information with a current identification number of the person seeking access to the secured location to verify that the current identification number is the same as the identification number in the encoded information; and then
granting access to the secured location only if the verifications are true; and then
in response to granting access, replacing the access code previously stored at the secured location with the new access code contained in the encoded information, so that the new access code becomes stored at the secured location for comparison with a subsequent present access code the next time access to the particular secured location is sought.
2. A method for allowing a particular person access to a selected one of plural automated teller machines (ATMs) by means of a portable terminal, comprising the steps of:
generating an encoded access message containing information identifying an access code previously stored at the selected ATM, and a personal identification number (PIN) for the particular person;
entering the encoded message in the portable terminal apart from the ATM;
entering the PIN in unencoded form in the portable terminal;
comparing the entered PIN with the PIN contained in the encoded message previously entered into the portable terminal to authorize an access only if the PINs bear a predetermined relation to each other; and then
establishing data communication between the portable terminal and an ATM, and transferring the access message in encoded form from the portable terminal to the ATM;
comparing the access code contained in the encoded message with the access code previously stored at the ATM to verify that the access code in the encoded message is the same as the access code at the selected ATM;
re-entering the PIN in unencoded form into the portable terminal;
comparing the re-entered PIN with the PIN contained in the encoded message communicated to the ATM from the terminal; and
granting access to the ATM only if the same access codes are present and the re-entered PIN bears a predetermined relation to the PIN in the encoded message communicated to the ATM.
3. The method as in claim 2, wherein:
the portable terminal erases the PIN previously entered in unencoded form, in response to the first step of comparing that PIN with the PIN in the encoded access message,
so that the unencoded PIN cannot be determined thereafter by access to information entered in the portable terminal.
4. The method as in claim 2, wherein:
the access code in the encoded access message is a present access code, and the encoded message also contains a future access code for the next authorized access to the ATM, and
substituting the future access code for the access code previously stored at the selected ATM in response to granting access to the ATM, so that the future access code remains at the selected ATM for comparison with a present access code in another encoded message the next time access to the ATM is sought.
5. The method as in claim 4, comprising the further step of erasing both access codes from the portable terminal once the future access code is substituted for the access code previously stored at the selected ATM.
6. A method for allowing a particular person to access a secured location, comprising the steps of:
generating information including a unique original access code previously stored at the secured location, a new access code for the secured location, and an identification number for the particular person;
encrypting the encoded information;
transferring the encrypted information to the secured location;
decrypting the encrypted information;
comparing the original access code in the decrypted information with the access code previously stored at the secured location to verify that a predetermined relation exists therebetween;
allowing access to the secured location only if the verification is true; and
replacing the access code stored at the secured location with the new access code in the decrypted information, in response to allowing access, so that the new access code is stored at the secured location for comparison when attempting the next access.
7. Apparatus for obtaining selective access to a cash-receiving device having a receptacle for receiving a removable cash box and a closure for preventing unauthorized access to the receptacle, comprising:
means associated with the device to receive and store an access code required for the next access to the device;
a portable terminal separate from the device for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the device;
means associated with the portable terminal for entering an unencoded PIN;
means associated with the portable terminal for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message;
data transfer means selectively operative to transfer the encoded access message to the device only in response to the certain logic state;
means associated with the device for comparing the access code in the access message with an access code stored at the device and providing an authorization signal allowing access to the receptacle only in response to a predetermined relation between the access codes;
an encoded label associated with each cash box to identify that cash box; and
a scanner associated with the portable terminal to scan the label on each cash box removed from a device and on each empty cash box installed in the device, whereby signals identifying the removed and installed cash boxes are stored in the portable terminal.
8. Apparatus as in claim 7, wherein:
the cash receiving device is a pay telephone having a receptacle for receiving a movable coin box and a door for preventing unauthorized access to the receptacle, and further comprising:
a latch associated with the door and operative only in response to the authorization signal to release the door for access to the receptacle.
9. Apparatus as in claim 8, wherein:
the latch comprises a solenoid selectively operative to release the door, and further comprising
means selectively operative in response to the authorization signal to supply operating current to the solenoid from the terminal,
whereby the solenoid releases the door.
10. A method for allowing access to a secured location, comprising the steps of:
generating a signal containing encoded access information identifying an access code for a particular secured location and an identification number for a particular person authorized to access that location;
transferring the encoded information to the secured location by entering that encoded information into a portable terminal carried by the person seeking access to the secured location;
entering the current identification number into the terminal;
comparing the identification number in the encoded information with the identification number entered into the terminal;
erasing the encoded access information from the terminal if a predetermined relation between the identification numbers is not presented by the comparison;
comparing the access code in the encoded information with an access code previously stored at the secured location to verify that the access code in the encoded information is the same as the access code at the secured location;
comparing the identification number in the encoded information with a current identification number of the person seeking access to the secured location to verify that the current identification number is the same as the identification number in the encoded information; and then
granting access to the secured location only if the verification are true.
11. The method as in claim 10, comprising the further steps of:
transferring the access information in encoded form from the terminal to the secured location, if and only if the predetermined relation between identification numbers is present; and thereafter
performing the step of comparing access codes.
12. The method as in claim 10, comprising the further steps of:
decoding the signal containing encoded access information after transferring that signal to the secured location;
performing the step of comparing the identification numbers; and then
re-encoding the access information within the terminal if and only if the predetermined relation between identification numbers is present; and thereafter
transferring the re-encoded access information to the secured location.
13. The method as in claim 10, wherein:
the portable terminal contains a unique serial number distinguishing that terminal from other terminals;
the encoded information includes the serial number of a particular terminal authorized for the next access to the secured location; and
comparing the serial number in the encoded information with the serial number within the terminal to determine whether the serial numbers match; and
aborting the access attempt if the terminal identification numbers do not match.
14. Apparatus for obtaining selective access to a secured location, comprising:
means associated with the secured location to receive and store an access code required for the next access to the secured location;
terminal means separate from the secured location for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the location;
means associated with the terminal means for entering an unencoded PIN;
means associated with the terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message;
data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state;
means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes; and
the terminal means is operative in response to the certain logic state to erase the unencoded PIN previously entered in the terminal means, whereby the terminal means cannot transfer the unencoded PIN to the secured location.
15. Apparatus for obtaining selective access to a secured location, comprising:
means associated with the secured location to receive and store an access code required for the next access to the remote location;
terminal means separate from the secured location for receiving an access message containing in encoded from an access code and a personal identification number (PIN) for a certain person authorized to access the location;
means associated with the terminal means for entering an unencoded PIN;
means associated with terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message;
data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state;
means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes; and
the secured location includes means responsive to re-entry of an unencoded PIN at the entry means of the terminal to compare the re-entered PIN with the PIN in the encoded access message transferred to the secured location and to provide the access authorization signal only in response to a predetermined relation between the PINs in addition to the predetermined relation between access codes.
16. Apparatus for obtaining selective access to a pay telephone having a receptacle for receiving a removable coin box and a door for preventing unauthorized access to the receptacle, comprising:
means associated with the telephone to receive and store an access code required for the next access to the telephone;
terminal means separate from the telephone for receiving an access message containing in encoded form an access code and a personal identification number (PIN) for a certain person authorized to access the telephone;
means associated with the terminal means for entering an unencoded PIN;
means associated with the terminal means for producing a certain logic state when the entered PIN has a predetermined relation to the PIN encoded in the access message;
data transfer means selectively operative to transfer the encoded access message to the secured location only in response to the certain logic state;
means associated with the secured location for comparing the access code in the access message with an access code stored at the secured location and providing an authorization signal allowing access to the secured location only in response to a predetermined relation between the access codes;
a solenoid latch associated with the door and operative only in response to the authorization signal to release the door for access to the receptacle; and
a circuit connected to a telephone line for the telephone and operative in response to the authorization signal to temporarily supply the solenoid ringing current on the telephone line,
whereby the solenoid operates to unlatch the door in response to ringing current on the telephone line during the temporary connection.
17. A method for allowing a particular person access to a selected one of plural secured devices by means of a terminal, comprising the steps of:
generating an encoded access message containing information identifying an access code previously stored at the selected secured device, and a personal identification number (PIN) for the particular person;
entering the PIN in unencoded form in the terminal;
entering the encoded message in the terminal apart from the secured device;
comparing the entered PIN with the PIN contained in the encoded message previously entered into the terminal to authorize an access only if the PINs bear a predetermined relation to each other, and then
establishing data communication between the terminal and a particular secured device, and transferring the access message in encoded form from the terminal to the secured device;
comparing the access code contained in the encoded message with the access code previously stored at the secured device to verify that the particular secured device is the selected secured device;
re-entering the PIN in unencoded form into the terminal;
comparing the re-entered PIN with the PIN contained in the encoded message communicated to the secured device from the terminal; and
granting access to the selected secured device only if the comparison of access codes verified that the particular secured device is the selected secured device and the re-entered PIN bears a predetermined relation to the PIN in the encoded message communicated to the secured device.
18. A method for allowing a particular person access to a selected one of plural secured devices by means of a terminal, comprising the steps of:
generating an encoded access message remote from the secured device, the access message containing information identifying an access code previously stored at the selected secured device and a personal identification number (PIN) for the particular person;
transferring the encoded message to the selected secured device;
decoding the encoded message to obtain the access code and PIN in unencoded form;
supplying the PIN of the person in unencoded form to the selected secured device;
comparing the supplied PIN with the PIN obtained by decoding the encoded message transferred to the selected secured device to authorize an access only if the PINs bear a predetermined relation to each other; and then
comparing the access code obtained by decoding the encoded message transferred to the secured device with the access code previously stored at the secured device to verify the identity of the selected secured device;
granting access to the selected secured device only if the comparison of access codes verifies that the particular secured device is the selected secured device and the supplied PIN bears a predetermined relation to the PIN in the encoded message communicated to the secured device; and
erasing the access message if the predetermined relation is not presented by the comparison.
19. A method for allowing a person to access a secured location, comprising the steps of:
generating an encrypted message containing information identifying an access code for a particular secured location and an identification number for a particular person authorized to access that location;
entering the encrypted message into a portable terminal carried by the person seeking access to the secured location;
entering into the terminal an identification number for that person;
decrypting the message within the portable terminal to obtain the identification number;
comparing the identification number in the message with the identification number entered into the portable terminal;
if a predetermined relation between the identification numbers is presented by the comparison, establishing data communication between the portable terminal and the secured location; and then
decrypting the message to obtain the access code;
comparing the access code in the decrypted message with an access code previously stored at the secured location to verify that the access code in the message is the same as the access code at the secured location; and
granting access to the secured location only if the verification is true.
20. The method as in claim 19, comprising the further step of:
erasing the encrypted access message from the terminal if the predetermined relation between identification numbers is not presented by the comparison.
21. The method as in claim 19, wherein;
after the second-mentioned step of decrypting the access code, re-entering the identification number and again comparing that identification number with the decrypted identification number; and
terminating the attempted access if a predetermined relation is not present between the identification numbers.
22. The method as in claim 19, wherein:
the access code in the encrypted message is a present access code;
the encrypted message also contains a new access code for the next authorized access to the secured location;
the step of comparing access codes comprises comparing the present access code decrypted from the encrypted message with an access code previously stored at the secured location; and then
in response to granting access, replacing the access code previously stored at the secured location with the new access code decrypted from the encrypted message, so that the new access code becomes stored at the secured location for comparison with a subsequent present access code the next time access to the particular secured location is sought.
23. A method for allowing a person to access a secured device, comprising the steps of:
generating a message containing information identifying an access code for a particular secured device, a terminal number for a certain terminal, and an identification number for a particular person authorized to access that device;
entering the message into a terminal operatively associated with a terminal number;
entering into the terminal an identification number for that person;
comparing the identification number in the message with the identification number entered into the terminal;
comparing the terminal number in the message with the terminal number associated with the terminal;
if predetermined relations occur between the identification numbers and between the terminal numbers in response to the comparisons, establishing data communication between the terminal and the secured device, otherwise terminating the attempted access;
once the data communication is established, comparing the access code in the message with an access code previously stored at the secured device to verify that the access code in the message is the same as the access code at the secured device; and
granting access to the secured device only if the access code verification is true.
24. The method as in claim 23, wherein:
The message is generated in encrypted form and is entered into the terminal in that form; and comprising the further step of decrypting the message within the portable terminal to obtain the identification number and the terminal number for the comparisons.
US07/811,720 1990-04-22 1991-12-20 Apparatus and method for controlled access to a secured location Expired - Lifetime US5321242A (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US08/231,326 US5451757A (en) 1990-04-22 1990-04-22 Apparatus and method for controlled access to a secured location
US07/811,720 US5321242A (en) 1991-12-09 1991-12-20 Apparatus and method for controlled access to a secured location
CA002083228A CA2083228C (en) 1991-12-09 1992-11-18 Apparatus and method for controlled access to a secured location
EP92310549A EP0546701A2 (en) 1991-12-09 1992-11-19 Apparatus and method for controlled access to secured location
JP32934492A JPH0689383A (en) 1991-12-09 1992-12-09 Device and method for performing handling of storing place which is safely managed

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US80478091A 1991-12-09 1991-12-09
US07/811,720 US5321242A (en) 1991-12-09 1991-12-20 Apparatus and method for controlled access to a secured location

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US80478091A Continuation-In-Part 1991-12-09 1991-12-09

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US08/231,326 Continuation US5451757A (en) 1990-04-22 1990-04-22 Apparatus and method for controlled access to a secured location

Publications (1)

Publication Number Publication Date
US5321242A true US5321242A (en) 1994-06-14

Family

ID=27122722

Family Applications (1)

Application Number Title Priority Date Filing Date
US07/811,720 Expired - Lifetime US5321242A (en) 1990-04-22 1991-12-20 Apparatus and method for controlled access to a secured location

Country Status (4)

Country Link
US (1) US5321242A (en)
EP (1) EP0546701A2 (en)
JP (1) JPH0689383A (en)
CA (1) CA2083228C (en)

Cited By (130)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995030215A1 (en) * 1994-05-03 1995-11-09 Coinstar, Inc. Coupon/voucher dispensing machine and method
US5488358A (en) * 1994-02-18 1996-01-30 Mas-Hamilton Group Electronic combination lock with closure and locking verification
US5488660A (en) * 1993-10-20 1996-01-30 Mas-Hamilton Group Electronic combination lock utilizing a one-time use combination
US5564546A (en) * 1992-09-04 1996-10-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5616900A (en) * 1995-07-14 1997-04-01 Seewoster; O. Ben ATM keypad operating device
US5724423A (en) * 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
US5736932A (en) * 1996-07-03 1998-04-07 At&T Corp Security for controlled access systems
US5746299A (en) * 1995-04-27 1998-05-05 Coinstar, Inc. Coin counter dejamming method and apparatus
US5764789A (en) * 1994-11-28 1998-06-09 Smarttouch, Llc Tokenless biometric ATM access system
US5774365A (en) * 1996-04-24 1998-06-30 The Standard Register Company Document dispenser operator security
US5773803A (en) * 1995-09-28 1998-06-30 Toyota Jidosha Kabushiki Kaisha Code discriminating system for determining correspondence of codes in a short time
US5802199A (en) * 1994-11-28 1998-09-01 Smarttouch, Llc Use sensitive identification system
US5805719A (en) * 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5909794A (en) * 1992-09-04 1999-06-08 Coinstar, Inc. Donation transaction method and apparatus
US5912962A (en) * 1996-02-06 1999-06-15 Northern Telecom Limited Method of porting for use with local number portability
US5988348A (en) 1996-06-28 1999-11-23 Coinstar, Inc. Coin discrimination apparatus and method
US6012039A (en) * 1994-11-28 2000-01-04 Smarttouch, Inc. Tokenless biometric electronic rewards system
US6047808A (en) * 1996-03-07 2000-04-11 Coinstar, Inc. Coin sensing apparatus and method
US6056104A (en) * 1996-06-28 2000-05-02 Coinstar, Inc. Coin sensing apparatus and method
US6154879A (en) * 1994-11-28 2000-11-28 Smarttouch, Inc. Tokenless biometric ATM access system
USRE37011E1 (en) * 1993-10-20 2001-01-09 Mas-Hamilton Group, Inc. Electronic combination lock utilizing a one time use combination
US6230148B1 (en) 1994-11-28 2001-05-08 Veristar Corporation Tokenless biometric electric check transaction
US6269348B1 (en) 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US6293469B1 (en) 1994-12-20 2001-09-25 Dh Technology Inc. Transaction printer
US20010051924A1 (en) * 2000-05-09 2001-12-13 James Uberti On-line based financial services method and system utilizing biometrically secured transactions for issuing credit
US20020019811A1 (en) * 2000-05-31 2002-02-14 Veristar Corporation Biometric financial transaction system and method
US6366682B1 (en) 1994-11-28 2002-04-02 Indivos Corporation Tokenless electronic transaction system
US6397198B1 (en) 1994-11-28 2002-05-28 Indivos Corporation Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
US6409086B1 (en) 1997-08-08 2002-06-25 Symbol Technolgies, Inc. Terminal locking system
US6478220B2 (en) * 1996-10-04 2002-11-12 First Data Corporation Apparatus and method for issuing documents of value
US6494776B1 (en) 1992-09-04 2002-12-17 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US20030057054A1 (en) * 2001-09-21 2003-03-27 Waechter Mark L. Method and apparatus for coin or object sensing using adaptive operating point control
US6564997B1 (en) 1999-11-15 2003-05-20 Idx, Inc. Electronic security key for enabling electronic coin acceptors and the like
US6581161B1 (en) * 1998-12-12 2003-06-17 International Business Machines Corporation System, apparatus and method for controlling access
US6602125B2 (en) 2001-05-04 2003-08-05 Coinstar, Inc. Automatic coin input tray for a self-service coin-counting machine
US6615353B1 (en) * 1997-07-23 2003-09-02 Yokogawa Digital Computer Corporation User authentication method and user authentication system
US6633881B2 (en) 2001-08-22 2003-10-14 The Upper Skagit Indian Tribe Record-keeping for gaming machine operations
US6679422B2 (en) 2002-01-31 2004-01-20 International Business Machines Corporation Automatic teller system and method of marking illegally obtained cash
US20040025039A1 (en) * 2002-04-30 2004-02-05 Adam Kuenzi Lock box security system with improved communication
US20040053654A1 (en) * 2000-07-25 2004-03-18 Hitoshi Kokumai Secret information record medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
US20040078721A1 (en) * 2002-03-26 2004-04-22 Emrys Williams Service operations on a computer system
US6736251B2 (en) 1992-09-04 2004-05-18 Coinstar, Inc. Coin counter and voucher dispensing machine and method
US20040097243A1 (en) * 2000-06-30 2004-05-20 Zellner Samuel N. Location blocking service for wireless networks
US20040128249A1 (en) * 1994-11-28 2004-07-01 Indivos Corporation, A Delaware Corporation System and method for tokenless biometric electronic scrip
US6766892B2 (en) 1996-06-28 2004-07-27 Coinstar, Inc. Coin discrimination apparatus and method
US20040160304A1 (en) * 2002-04-30 2004-08-19 General Electric Company Managing access to physical assets
US20050041385A1 (en) * 1993-02-19 2005-02-24 Dan Kikinis Micro personal digital assistant with a compressed BIOS system
US20050076381A1 (en) * 2003-10-03 2005-04-07 Donny Gross Electronic monitoring of activities performed at a cable television tap
US6879966B1 (en) 1994-11-28 2005-04-12 Indivos Corporation Tokenless biometric electronic financial transactions via a third party identicator
US20050110609A1 (en) * 2003-01-31 2005-05-26 General Electric Company Methods for managing access to physical assets
US20050127167A1 (en) * 1999-08-02 2005-06-16 Softbankbb Corporation Electronic settlement system, settlement apparatus and terminal
US20050212656A1 (en) * 1994-11-15 2005-09-29 Micro Enhanced Technology, Inc. Electronic access control device
US20050272445A1 (en) * 2000-12-19 2005-12-08 Bellsouth Intellectual Property Corporation Location-based security rules
US6980670B1 (en) 1998-02-09 2005-12-27 Indivos Corporation Biometric tokenless electronic rewards system and method
US20050289058A1 (en) * 1994-11-28 2005-12-29 Ned Hoffman System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US20060029261A1 (en) * 1994-11-28 2006-02-09 Ned Hoffman Tokenless electronic transaction system
US20060090077A1 (en) * 2001-01-04 2006-04-27 Little Lincoln M System and method for authorizing transfer of software into embedded systems
US20060089134A1 (en) * 2000-12-19 2006-04-27 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US20060101274A1 (en) * 2004-11-05 2006-05-11 Scm Microsystems Gmbh Data transfer in an access system
US20060139147A1 (en) * 2002-08-13 2006-06-29 Hermann Sterzinger Portable security container
US20060159306A1 (en) * 2003-03-04 2006-07-20 United Parcel Service Of America, Inc. Item tracking and processing systems and methods
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
US7152045B2 (en) * 1994-11-28 2006-12-19 Indivos Corporation Tokenless identification system for authorization of electronic transactions and electronic transmissions
US20070010260A1 (en) * 2000-12-19 2007-01-11 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US20070055891A1 (en) * 2005-09-08 2007-03-08 Serge Plotkin Protocol translation
US7212098B1 (en) 2000-09-21 2007-05-01 Myspace, Llc Portable security container
US7229009B1 (en) * 2002-07-16 2007-06-12 Diebold Self-Service Systems, Division Of Diebold, Incorporated Automated banking machine component authentication system and method
US20070162390A1 (en) * 2005-12-22 2007-07-12 Macrovision Corporation Techniques for distributing and monitoring content
US7264150B1 (en) 2003-07-24 2007-09-04 Tidel Engineering, L.P. Computerized drop safe and control software
US20070289012A1 (en) * 2006-06-13 2007-12-13 Leemon Baird Remotely controllable security system
US20080049696A1 (en) * 1995-06-06 2008-02-28 Stewart Brett B Method and apparatus for geographic-based communications service
US20080252415A1 (en) * 2007-04-12 2008-10-16 Larson Wayne F Restricted range lockbox, access device and methods
US20080260201A1 (en) * 2001-04-24 2008-10-23 Rhoads Geoffrey B Digital Watermarking Apparatus and Methods
EP2043064A2 (en) * 2007-09-26 2009-04-01 NCR Corporation Self-service terminal
US7523067B1 (en) * 2000-08-02 2009-04-21 Softbankbb Corporation Electronic settlement system, settlement apparatus, and terminal
US20090233623A1 (en) * 2008-03-14 2009-09-17 Johnson William J System and method for location based exchanges of data facilitating distributed locational applications
US7631193B1 (en) 1994-11-28 2009-12-08 Yt Acquisition Corporation Tokenless identification system for authorization of electronic transactions and electronic transmissions
US7653599B2 (en) 2002-02-15 2010-01-26 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US7779457B2 (en) 2004-06-09 2010-08-17 Identifid, Inc Identity verification system
US20100308109A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International System, method, and apparatus for smart card pin management via an unconnected reader
US20100308110A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International Smart card pin management via an unconnected reader
US20100312709A1 (en) * 2009-06-05 2010-12-09 Dynamic Card Solutions International Payment application pin data self-encryption
US7865432B2 (en) 2002-02-15 2011-01-04 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US7882032B1 (en) 1994-11-28 2011-02-01 Open Invention Network, Llc System and method for tokenless biometric authorization of electronic communications
US7971699B2 (en) 1992-09-04 2011-07-05 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US8033375B2 (en) 2002-02-15 2011-10-11 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US8177132B1 (en) 2008-09-17 2012-05-15 Bank Of America Corporation RFID tracking for currency transfers and transportation
US8297520B1 (en) 2011-09-16 2012-10-30 Google Inc. Secure application directory
US8335932B2 (en) 2010-12-17 2012-12-18 Google Inc. Local trusted services manager for a contactless smart card
US8335921B2 (en) 2010-12-17 2012-12-18 Google, Inc. Writing application data to a secure element
US8379863B1 (en) 2011-09-15 2013-02-19 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US8385553B1 (en) * 2012-02-28 2013-02-26 Google Inc. Portable secure element
US8402117B2 (en) 2000-06-30 2013-03-19 At&T Intellectual Property I, L.P. Anonymous location service for wireless networks
US8412933B1 (en) 2011-09-15 2013-04-02 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8494501B2 (en) 2000-12-19 2013-07-23 At&T Intellectual Property I, L.P. Identity blocking service from a wireless service provider
US8509813B2 (en) 2000-12-19 2013-08-13 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US8538456B2 (en) 2000-12-19 2013-09-17 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US8566839B2 (en) 2008-03-14 2013-10-22 William J. Johnson System and method for automated content presentation objects
US8588130B2 (en) 1999-11-03 2013-11-19 Wayport, Inc. Distributed network communication system to provide wireless access to a computing device at a reduced rate
US8600341B2 (en) 2008-03-14 2013-12-03 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US8606851B2 (en) 1995-06-06 2013-12-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US8634796B2 (en) 2008-03-14 2014-01-21 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8646059B1 (en) 2010-12-17 2014-02-04 Google Inc. Wallet application for interacting with a secure element application without a trusted server for authentication
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US8874467B2 (en) 2011-11-23 2014-10-28 Outerwall Inc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US8897741B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for mobile device usability by locational conditions
US8898746B2 (en) 1997-06-11 2014-11-25 Prism Technologies Llc Method for managing access to protected computer resources
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US8971533B2 (en) 2012-04-06 2015-03-03 Google Inc. Secure reset of personal and service provider information on mobile devices
US8967361B2 (en) 2013-02-27 2015-03-03 Outerwall Inc. Coin counting and sorting machines
US9022841B2 (en) 2013-05-08 2015-05-05 Outerwall Inc. Coin counting and/or sorting machines and associated systems and methods
US9036890B2 (en) 2012-06-05 2015-05-19 Outerwall Inc. Optical coin discrimination systems and methods for use with consumer-operated kiosks and the like
US9064268B2 (en) 2010-11-01 2015-06-23 Outerwall Inc. Gift card exchange kiosks and associated methods of use
US9064366B1 (en) 2008-09-17 2015-06-23 Bank Of America Corporation Blind withdrawal for transportation
US9129294B2 (en) 2012-02-06 2015-09-08 Outerwall Inc. Coin counting machines having coupon capabilities, loyalty program capabilities, advertising capabilities, and the like
US9141090B2 (en) 2011-11-11 2015-09-22 Master Lock Company Llc Access code management systems
US9165323B1 (en) 2000-05-31 2015-10-20 Open Innovation Network, LLC Biometric transaction system and method
US9235945B2 (en) 2014-02-10 2016-01-12 Outerwall Inc. Coin input apparatuses and associated methods and systems
US9443367B2 (en) 2014-01-17 2016-09-13 Outerwall Inc. Digital image coin discrimination for use with consumer-operated kiosks and the like
US9466076B2 (en) 2000-12-19 2016-10-11 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US9477991B2 (en) 2013-08-27 2016-10-25 Snap Trends, Inc. Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network
US9648454B2 (en) 2000-12-19 2017-05-09 At&T Intellectual Property I, L.P. System and method for permission to access mobile location information
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US9953518B2 (en) * 2016-07-29 2018-04-24 Honeywell International Inc. Systems and methods for predicting and increasing the threat level at ATM centers prior to alarm event detection
EP3425602A1 (en) * 2017-07-06 2019-01-09 Wincor Nixdorf International GmbH Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system
US10346819B2 (en) 2015-11-19 2019-07-09 Coinstar Asset Holdings, Llc Mobile device applications, other applications and associated kiosk-based systems and methods for facilitating coin saving
US11308231B2 (en) * 2020-04-30 2022-04-19 Bank Of America Corporation Security control management for information security
US11438364B2 (en) 2020-04-30 2022-09-06 Bank Of America Corporation Threat analysis for information security

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2751111B1 (en) 1996-07-10 1998-10-09 Axytrans SYSTEM FOR SECURE TRANSPORT OF OBJECTS IN TAMPER-PROOF CONTAINERS OF WHICH AT LEAST ONE DESTINATION STATION IS MOBILE AND TRANSPORTABLE
JP2000194448A (en) 1998-12-25 2000-07-14 Nec Corp Electronic computer having file bay cover with electronic lock and its control method
JP2002007932A (en) * 2000-06-21 2002-01-11 Nec Corp Data sale prompt settlement method and prepaid card
FR2823248A1 (en) * 2001-04-09 2002-10-11 Schlumberger Systems & Service Control of access to an enclosed cabinet using a motor operating in response to predetermined events, uses a dual enclosure with the inner door remotely controlled by radio with its lock operated by an electric motor
GB2395978A (en) * 2002-12-02 2004-06-09 Ncr Int Inc Processor with lock control functionality
ES2664947T3 (en) 2005-10-24 2018-04-24 Dormakaba Schweiz Ag Lock lock and lock control procedure
KR20150131035A (en) 2013-03-13 2015-11-24 스펙트럼 브랜즈, 인크. Interconnected locking system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4207555A (en) * 1978-03-03 1980-06-10 The Eastern Company Lock system
US4234932A (en) * 1978-09-05 1980-11-18 Honeywell Information Systems Inc. Security system for remote cash dispensers
US4390968A (en) * 1980-12-30 1983-06-28 Honeywell Information Systems Inc. Automated bank transaction security system
JPS6097469A (en) * 1983-11-02 1985-05-31 Hitachi Ltd Automatic cash transaction device
US4523087A (en) * 1981-04-07 1985-06-11 Benton William M Transaction verification system using optical coupling data communication link
EP0164733A2 (en) * 1984-06-11 1985-12-18 Omron Tateisi Electronics Co. Bank note cartridge identification system for cash dispensor
US4663952A (en) * 1985-01-18 1987-05-12 Egon Gelhard Device for the contactless coupling of the control and output currents between the electronic elements on the locking cylinder and the electronic elements in the key of an electro/mechanical locking device
US4829296A (en) * 1986-04-30 1989-05-09 Carey S. Clark Electronic lock system
US4858453A (en) * 1986-12-06 1989-08-22 Kokusan Kinzoku Kogyo Kabushiki Kaisha Car anti-theft device
GB2225918A (en) * 1988-11-18 1990-06-13 Anritsu Corp Telephone with data setting by remote control
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
GB2237912A (en) * 1989-11-06 1991-05-15 Mercury Communications Fraud control system
US5056643A (en) * 1988-08-25 1991-10-15 Scheidt & Bachmann Gesellschaft Mit Beschrankter Haftung Method for recording the placement of replaceable, self-filling coin-storing units
US5131038A (en) * 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61117375A (en) * 1984-11-13 1986-06-04 株式会社リコー Entrance and exit control system
JPS628293A (en) * 1985-07-03 1987-01-16 オムロン株式会社 Card system
JPS6282490A (en) * 1985-10-07 1987-04-15 株式会社東芝 Entrance and withdrawal supervising system
JPH02235166A (en) * 1989-03-09 1990-09-18 Mitsubishi Electric Corp Ic card application device
JP2804511B2 (en) * 1989-05-19 1998-09-30 沖電気工業株式会社 Cash transaction device locking device
JPH0328476A (en) * 1989-06-23 1991-02-06 Mitsubishi Electric Corp Ic card key

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4207555A (en) * 1978-03-03 1980-06-10 The Eastern Company Lock system
US4234932A (en) * 1978-09-05 1980-11-18 Honeywell Information Systems Inc. Security system for remote cash dispensers
US4390968A (en) * 1980-12-30 1983-06-28 Honeywell Information Systems Inc. Automated bank transaction security system
US4523087A (en) * 1981-04-07 1985-06-11 Benton William M Transaction verification system using optical coupling data communication link
JPS6097469A (en) * 1983-11-02 1985-05-31 Hitachi Ltd Automatic cash transaction device
EP0164733A2 (en) * 1984-06-11 1985-12-18 Omron Tateisi Electronics Co. Bank note cartridge identification system for cash dispensor
US4663952A (en) * 1985-01-18 1987-05-12 Egon Gelhard Device for the contactless coupling of the control and output currents between the electronic elements on the locking cylinder and the electronic elements in the key of an electro/mechanical locking device
US4829296A (en) * 1986-04-30 1989-05-09 Carey S. Clark Electronic lock system
US4858453A (en) * 1986-12-06 1989-08-22 Kokusan Kinzoku Kogyo Kabushiki Kaisha Car anti-theft device
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
US5056643A (en) * 1988-08-25 1991-10-15 Scheidt & Bachmann Gesellschaft Mit Beschrankter Haftung Method for recording the placement of replaceable, self-filling coin-storing units
GB2225918A (en) * 1988-11-18 1990-06-13 Anritsu Corp Telephone with data setting by remote control
GB2237912A (en) * 1989-11-06 1991-05-15 Mercury Communications Fraud control system
US5131038A (en) * 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Enter the Electronic Security Age", Medeco High Security Locks, pp. 1-21.
"Guard Buddy" Project, Honeywell Protection Services.
Enter the Electronic Security Age , Medeco High Security Locks, pp. 1 21. *
Guard Buddy Project, Honeywell Protection Services. *

Cited By (290)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6494776B1 (en) 1992-09-04 2002-12-17 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US7874478B2 (en) 1992-09-04 2011-01-25 Coinstar, Inc. Coin counter and voucher dispensing machine and method
US5799767A (en) * 1992-09-04 1998-09-01 Coinstar, Inc. Cleaning apparatus and method for a coin counter and voucher dispenser
US5564546A (en) * 1992-09-04 1996-10-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US6758316B2 (en) 1992-09-04 2004-07-06 Coinstar, Inc. Coin counter and voucher dispensing machine and method
US20040124062A1 (en) * 1992-09-04 2004-07-01 Molbak Jens H. Coin counter and voucher dispensing machine and method
US6736251B2 (en) 1992-09-04 2004-05-18 Coinstar, Inc. Coin counter and voucher dispensing machine and method
US5909794A (en) * 1992-09-04 1999-06-08 Coinstar, Inc. Donation transaction method and apparatus
US6047807A (en) 1992-09-04 2000-04-11 Coinstar, Inc. Restricted access coin counter
US7971699B2 (en) 1992-09-04 2011-07-05 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US20050041385A1 (en) * 1993-02-19 2005-02-24 Dan Kikinis Micro personal digital assistant with a compressed BIOS system
USRE37011E1 (en) * 1993-10-20 2001-01-09 Mas-Hamilton Group, Inc. Electronic combination lock utilizing a one time use combination
USRE38147E1 (en) 1993-10-20 2003-06-17 Kaba Mas Corporation Electronic combination lock utilizing a one-time use combination
US5488660A (en) * 1993-10-20 1996-01-30 Mas-Hamilton Group Electronic combination lock utilizing a one-time use combination
US5488358A (en) * 1994-02-18 1996-01-30 Mas-Hamilton Group Electronic combination lock with closure and locking verification
US6484863B1 (en) 1994-05-03 2002-11-26 Coinstar Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
WO1995030215A1 (en) * 1994-05-03 1995-11-09 Coinstar, Inc. Coupon/voucher dispensing machine and method
US20050212656A1 (en) * 1994-11-15 2005-09-29 Micro Enhanced Technology, Inc. Electronic access control device
US8587405B2 (en) 1994-11-15 2013-11-19 O.S. Security Electronic access control device
US7698567B2 (en) 1994-11-28 2010-04-13 Yt Acquisition Corporation System and method for tokenless biometric electronic scrip
US6662166B2 (en) 1994-11-28 2003-12-09 Indivos Corporation Tokenless biometric electronic debit and credit transactions
US6012039A (en) * 1994-11-28 2000-01-04 Smarttouch, Inc. Tokenless biometric electronic rewards system
US6879966B1 (en) 1994-11-28 2005-04-12 Indivos Corporation Tokenless biometric electronic financial transactions via a third party identicator
US7620605B2 (en) 1994-11-28 2009-11-17 Yt Acquisition Corporation System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US7631193B1 (en) 1994-11-28 2009-12-08 Yt Acquisition Corporation Tokenless identification system for authorization of electronic transactions and electronic transmissions
US8260716B2 (en) 1994-11-28 2012-09-04 Open Invention Network, Llc System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US6154879A (en) * 1994-11-28 2000-11-28 Smarttouch, Inc. Tokenless biometric ATM access system
US7613659B1 (en) 1994-11-28 2009-11-03 Yt Acquisition Corporation System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US6230148B1 (en) 1994-11-28 2001-05-08 Veristar Corporation Tokenless biometric electric check transaction
US6269348B1 (en) 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5838812A (en) * 1994-11-28 1998-11-17 Smarttouch, Llc Tokenless biometric transaction authorization system
US6366682B1 (en) 1994-11-28 2002-04-02 Indivos Corporation Tokenless electronic transaction system
US6397198B1 (en) 1994-11-28 2002-05-28 Indivos Corporation Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
US20060107069A1 (en) * 1994-11-28 2006-05-18 Ned Hoffman System and method for tokenless biometric electronic scrip
US20070291996A1 (en) * 1994-11-28 2007-12-20 Indivos Corporation Tokenless electronic transaction system
US5805719A (en) * 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US7882032B1 (en) 1994-11-28 2011-02-01 Open Invention Network, Llc System and method for tokenless biometric authorization of electronic communications
US5802199A (en) * 1994-11-28 1998-09-01 Smarttouch, Llc Use sensitive identification system
US7606401B2 (en) 1994-11-28 2009-10-20 Yt Acquisition Corporation System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US7558407B2 (en) 1994-11-28 2009-07-07 Yt Acquisition Corporation Tokenless electronic transaction system
US20060029261A1 (en) * 1994-11-28 2006-02-09 Ned Hoffman Tokenless electronic transaction system
US6985608B2 (en) 1994-11-28 2006-01-10 Indivos Corporation Tokenless electronic transaction system
US6581042B2 (en) 1994-11-28 2003-06-17 Indivos Corporation Tokenless biometric electronic check transactions
US5764789A (en) * 1994-11-28 1998-06-09 Smarttouch, Llc Tokenless biometric ATM access system
US6594376B2 (en) 1994-11-28 2003-07-15 Indivos Corporation Tokenless electronic transaction system
US20050289058A1 (en) * 1994-11-28 2005-12-29 Ned Hoffman System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse
US20040128249A1 (en) * 1994-11-28 2004-07-01 Indivos Corporation, A Delaware Corporation System and method for tokenless biometric electronic scrip
US6950810B2 (en) 1994-11-28 2005-09-27 Indivos Corporation Tokenless biometric electronic financial transactions via a third party identicator
US7152045B2 (en) * 1994-11-28 2006-12-19 Indivos Corporation Tokenless identification system for authorization of electronic transactions and electronic transmissions
US20050203841A1 (en) * 1994-11-28 2005-09-15 Indivos Corporation Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
US8831994B1 (en) 1994-11-28 2014-09-09 Open Invention Network, Llc System and method for tokenless biometric authorization of electronic communications
US20050187843A1 (en) * 1994-11-28 2005-08-25 Lapsley Philip D. Tokenless biometric electronic financial transactions via a third party identicator
US6920435B2 (en) 1994-11-28 2005-07-19 Indivos Corporation Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
US7536352B2 (en) 1994-11-28 2009-05-19 Yt Acquisition Corporation Tokenless biometric electronic financial transactions via a third party identicator
US7248719B2 (en) 1994-11-28 2007-07-24 Indivos Corporation Tokenless electronic transaction system
US6439454B1 (en) 1994-12-20 2002-08-27 Axiohm Transaction Solutions, Inc. Transaction printer
US6293469B1 (en) 1994-12-20 2001-09-25 Dh Technology Inc. Transaction printer
US5746299A (en) * 1995-04-27 1998-05-05 Coinstar, Inc. Coin counter dejamming method and apparatus
US6095313A (en) * 1995-04-27 2000-08-01 Coinstar, Inc. Coin counter dejamming method and apparatus
US5957262A (en) * 1995-04-27 1999-09-28 Coinstar, Inc. Coin counter dejamming method and apparatus
US8892736B2 (en) 1995-06-06 2014-11-18 Wayport, Inc. Providing an advertisement based on a geographic location of a wireless access point
US8631128B2 (en) 1995-06-06 2014-01-14 Wayport, Inc. Method and apparatus for geographic-based communications service
US8199733B2 (en) 1995-06-06 2012-06-12 Wayport, Inc. Method and apparatus for geographic-based communications service
US8509246B2 (en) 1995-06-06 2013-08-13 Wayport, Inc. Method and apparatus for geographic-based communications service
US8583723B2 (en) 1995-06-06 2013-11-12 Wayport, Inc. Receiving location based advertisements on a wireless communication device
US8478887B2 (en) 1995-06-06 2013-07-02 Wayport, Inc. Providing advertisements to a computing device based on a predetermined criterion of a wireless access point
US8417763B2 (en) 1995-06-06 2013-04-09 Wayport, Inc. Providing information to a computing device based on known location and user information
US20080049696A1 (en) * 1995-06-06 2008-02-28 Stewart Brett B Method and apparatus for geographic-based communications service
US8606851B2 (en) 1995-06-06 2013-12-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US8095647B2 (en) 1995-06-06 2012-01-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US7840689B2 (en) 1995-06-06 2010-11-23 Wayport, Inc. Dynamically modifying the display of a computing device to provide advertisements
US8990287B2 (en) 1995-06-06 2015-03-24 Wayport, Inc. Providing promotion information to a device based on location
US8929915B2 (en) 1995-06-06 2015-01-06 Wayport, Inc. Providing information to a computing device based on known location and user information
US8250204B2 (en) 1995-06-06 2012-08-21 Wayport, Inc. Method and apparatus for geographic-based communications service
US5616900A (en) * 1995-07-14 1997-04-01 Seewoster; O. Ben ATM keypad operating device
US5724423A (en) * 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
US5773803A (en) * 1995-09-28 1998-06-30 Toyota Jidosha Kabushiki Kaisha Code discriminating system for determining correspondence of codes in a short time
US5912962A (en) * 1996-02-06 1999-06-15 Northern Telecom Limited Method of porting for use with local number portability
US6047808A (en) * 1996-03-07 2000-04-11 Coinstar, Inc. Coin sensing apparatus and method
US5774365A (en) * 1996-04-24 1998-06-30 The Standard Register Company Document dispenser operator security
US20070240967A1 (en) * 1996-06-28 2007-10-18 Martin Douglas A Coin discrimination apparatus and method
US5988348A (en) 1996-06-28 1999-11-23 Coinstar, Inc. Coin discrimination apparatus and method
US6766892B2 (en) 1996-06-28 2004-07-27 Coinstar, Inc. Coin discrimination apparatus and method
US20050016815A1 (en) * 1996-06-28 2005-01-27 Martin Douglas Alan Coin discrimination apparatus and method
US7520374B2 (en) * 1996-06-28 2009-04-21 Coinstar, Inc. Coin discrimination apparatus and method
US20090166151A1 (en) * 1996-06-28 2009-07-02 Douglas Alan Martin Coin discrimination apparatus and method
US6056104A (en) * 1996-06-28 2000-05-02 Coinstar, Inc. Coin sensing apparatus and method
US5736932A (en) * 1996-07-03 1998-04-07 At&T Corp Security for controlled access systems
US6478220B2 (en) * 1996-10-04 2002-11-12 First Data Corporation Apparatus and method for issuing documents of value
US8898746B2 (en) 1997-06-11 2014-11-25 Prism Technologies Llc Method for managing access to protected computer resources
US9369469B2 (en) 1997-06-11 2016-06-14 Prism Technologies, L.L.C. Method for managing access to protected computer resources
US9544314B2 (en) 1997-06-11 2017-01-10 Prism Technologies Llc Method for managing access to protected computer resources
US9413768B1 (en) 1997-06-11 2016-08-09 Prism Technologies Llc Method for managing access to protected computer resources
US6615353B1 (en) * 1997-07-23 2003-09-02 Yokogawa Digital Computer Corporation User authentication method and user authentication system
US6409086B1 (en) 1997-08-08 2002-06-25 Symbol Technolgies, Inc. Terminal locking system
US20020158130A1 (en) * 1997-08-08 2002-10-31 John Pellaumail Terminal locking system
US6796505B2 (en) 1997-08-08 2004-09-28 Symbol Technologies, Inc. Terminal locking system
US6980670B1 (en) 1998-02-09 2005-12-27 Indivos Corporation Biometric tokenless electronic rewards system and method
US20060083408A1 (en) * 1998-02-09 2006-04-20 Ned Hoffman Biometric tokenless electronic rewards system and method
US6581161B1 (en) * 1998-12-12 2003-06-17 International Business Machines Corporation System, apparatus and method for controlling access
US7865401B2 (en) 1999-08-02 2011-01-04 Softbank Bb Corporation Electronic settlement system, settlement apparatus, and terminal
US7457782B2 (en) 1999-08-02 2008-11-25 Softbankbb Corporation Electronic settlement system, settlement apparatus and terminal
US20050127167A1 (en) * 1999-08-02 2005-06-16 Softbankbb Corporation Electronic settlement system, settlement apparatus and terminal
US7571117B1 (en) 1999-08-02 2009-08-04 Softbankbb Corporation Electronic authentication system, authentication apparatus, and terminal
US7657490B1 (en) * 1999-08-02 2010-02-02 Softbankbb Corporation Electronic settlement system, settlement device, and terminal
US20060129504A1 (en) * 1999-08-02 2006-06-15 Softbankbb Corporation Electronic settlement system, settlement apparatus and terminal
US7448540B2 (en) 1999-08-02 2008-11-11 Softbankbb Corporation Electronic settlement system, settlement apparatus and terminal
US8588130B2 (en) 1999-11-03 2013-11-19 Wayport, Inc. Distributed network communication system to provide wireless access to a computing device at a reduced rate
US6564997B1 (en) 1999-11-15 2003-05-20 Idx, Inc. Electronic security key for enabling electronic coin acceptors and the like
US20010051924A1 (en) * 2000-05-09 2001-12-13 James Uberti On-line based financial services method and system utilizing biometrically secured transactions for issuing credit
US7970678B2 (en) 2000-05-31 2011-06-28 Lapsley Philip D Biometric financial transaction system and method
US8630932B1 (en) 2000-05-31 2014-01-14 Open Invention Network, Llc Biometric financial transaction system and method
US8630933B1 (en) 2000-05-31 2014-01-14 Open Invention Network, Llc Biometric financial transaction system and method
US9165323B1 (en) 2000-05-31 2015-10-20 Open Innovation Network, LLC Biometric transaction system and method
US20020019811A1 (en) * 2000-05-31 2002-02-14 Veristar Corporation Biometric financial transaction system and method
US20090205033A1 (en) * 2000-05-31 2009-08-13 Yt Acquisition Biometric financial transaction system and method
US7565329B2 (en) 2000-05-31 2009-07-21 Yt Acquisition Corporation Biometric financial transaction system and method
US8452680B1 (en) 2000-05-31 2013-05-28 Open Invention Network, Llc Biometric financial transaction system and method
US9571958B2 (en) 2000-06-30 2017-02-14 At&T Intellectual Propery I, L.P. Anonymous location service for wireless networks
US8402117B2 (en) 2000-06-30 2013-03-19 At&T Intellectual Property I, L.P. Anonymous location service for wireless networks
US20040097243A1 (en) * 2000-06-30 2004-05-20 Zellner Samuel N. Location blocking service for wireless networks
US8645505B2 (en) 2000-06-30 2014-02-04 At&T Intellectual Property I, L.P. Anonymous location service for wireless networks
US7664509B2 (en) 2000-06-30 2010-02-16 At&T Intellectual Property I, L.P. Location blocking service for wireless networks
US20090328162A1 (en) * 2000-07-25 2009-12-31 Mnemonic Security Limited Mutual for reporting a theft in an authentication system
US8577807B2 (en) * 2000-07-25 2013-11-05 Mnemonic Security Limited Method for protecting secret information in a system for reporting an emergency when secret information is accessed
US20040053654A1 (en) * 2000-07-25 2004-03-18 Hitoshi Kokumai Secret information record medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
US7523067B1 (en) * 2000-08-02 2009-04-21 Softbankbb Corporation Electronic settlement system, settlement apparatus, and terminal
US7212098B1 (en) 2000-09-21 2007-05-01 Myspace, Llc Portable security container
US20070171060A1 (en) * 2000-09-21 2007-07-26 Trent Douglas E Portable security container
US8644506B2 (en) 2000-12-19 2014-02-04 At&T Intellectual Property I, L.P. Location-based security rules
US20060099966A1 (en) * 2000-12-19 2006-05-11 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US9648454B2 (en) 2000-12-19 2017-05-09 At&T Intellectual Property I, L.P. System and method for permission to access mobile location information
US20050272445A1 (en) * 2000-12-19 2005-12-08 Bellsouth Intellectual Property Corporation Location-based security rules
US20080299957A1 (en) * 2000-12-19 2008-12-04 Zellner Samuel N System and method for using location information to execute an action
US8874140B2 (en) 2000-12-19 2014-10-28 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US8825035B2 (en) 2000-12-19 2014-09-02 At&T Intellectual Property I, L.P. System and method for remote control of appliances utilizing mobile location-based applications
US8805414B2 (en) 2000-12-19 2014-08-12 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US9763091B2 (en) 2000-12-19 2017-09-12 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US8755777B2 (en) 2000-12-19 2014-06-17 At&T Intellectual Property I, L.P. Identity blocking service from a wireless service provider
US9501780B2 (en) 2000-12-19 2016-11-22 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US9584647B2 (en) 2000-12-19 2017-02-28 At&T Intellectual Property I, L.P. System and method for remote control of appliances utilizing mobile location-based applications
US8639235B2 (en) 2000-12-19 2014-01-28 At&T Intellectual Property I, L.P. System and method for using location information to execute an action
US9852450B2 (en) 2000-12-19 2017-12-26 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US10217137B2 (en) 2000-12-19 2019-02-26 Google Llc Location blocking service from a web advertiser
US9020489B2 (en) 2000-12-19 2015-04-28 At&T Intellectual Property I, L.P. System and method for using location information to execute an action
US7941130B2 (en) 2000-12-19 2011-05-10 At&T Intellectual Property I, Lp System and method for using location information to execute an action
US20070010260A1 (en) * 2000-12-19 2007-01-11 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US7428411B2 (en) * 2000-12-19 2008-09-23 At&T Delaware Intellectual Property, Inc. Location-based security rules
US20070042789A1 (en) * 2000-12-19 2007-02-22 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US20080096529A1 (en) * 2000-12-19 2008-04-24 Samuel Zellner Location-Based Security Rules
US7593712B2 (en) 2000-12-19 2009-09-22 At&T Intellectual Property I, L.P. System and method for using location information to execute an action
US8538456B2 (en) 2000-12-19 2013-09-17 At&T Intellectual Property I, L.P. Surveying wireless device users by location
US8509813B2 (en) 2000-12-19 2013-08-13 At&T Intellectual Property I, L.P. Location blocking service from a wireless service provider
US20060089134A1 (en) * 2000-12-19 2006-04-27 Bellsouth Intellectual Property Corporation System and method for using location information to execute an action
US8494501B2 (en) 2000-12-19 2013-07-23 At&T Intellectual Property I, L.P. Identity blocking service from a wireless service provider
US9466076B2 (en) 2000-12-19 2016-10-11 At&T Intellectual Property I, L.P. Location blocking service from a web advertiser
US10354079B2 (en) 2000-12-19 2019-07-16 Google Llc Location-based security rules
US8260239B2 (en) 2000-12-19 2012-09-04 At&T Intellectual Property I, Lp System and method for using location information to execute an action
US20060090077A1 (en) * 2001-01-04 2006-04-27 Little Lincoln M System and method for authorizing transfer of software into embedded systems
US7636859B2 (en) * 2001-01-04 2009-12-22 Cummins Inc. System and method for authorizing transfer of software into embedded systems
US7957553B2 (en) 2001-04-24 2011-06-07 Digimarc Corporation Digital watermarking apparatus and methods
US20100142749A1 (en) * 2001-04-24 2010-06-10 Rhoads Geoffrey B Digital Watermarking Apparatus and Methods
US7545952B2 (en) * 2001-04-24 2009-06-09 Digimarc Corporation Image or video display devices
US20080260201A1 (en) * 2001-04-24 2008-10-23 Rhoads Geoffrey B Digital Watermarking Apparatus and Methods
US6602125B2 (en) 2001-05-04 2003-08-05 Coinstar, Inc. Automatic coin input tray for a self-service coin-counting machine
US6633881B2 (en) 2001-08-22 2003-10-14 The Upper Skagit Indian Tribe Record-keeping for gaming machine operations
US20030057054A1 (en) * 2001-09-21 2003-03-27 Waechter Mark L. Method and apparatus for coin or object sensing using adaptive operating point control
US6679422B2 (en) 2002-01-31 2004-01-20 International Business Machines Corporation Automatic teller system and method of marking illegally obtained cash
US7865432B2 (en) 2002-02-15 2011-01-04 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US8229851B2 (en) 2002-02-15 2012-07-24 Coinstar, Inc. Methods and systems for exchanging/transferring gift cards
US8024272B2 (en) 2002-02-15 2011-09-20 Coinstar, Inc. Methods and systems for exchanging/transferring gift cards
US8332313B2 (en) 2002-02-15 2012-12-11 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US8103586B2 (en) 2002-02-15 2012-01-24 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US7653599B2 (en) 2002-02-15 2010-01-26 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US8033375B2 (en) 2002-02-15 2011-10-11 Coinstar, Inc. Methods and systems for exchanging and/or transferring various forms of value
US6918055B2 (en) * 2002-03-26 2005-07-12 Sun Microsystems, Inc. Service operations on a computer system
US20040078721A1 (en) * 2002-03-26 2004-04-22 Emrys Williams Service operations on a computer system
US7061367B2 (en) 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US20040025039A1 (en) * 2002-04-30 2004-02-05 Adam Kuenzi Lock box security system with improved communication
US20040160304A1 (en) * 2002-04-30 2004-08-19 General Electric Company Managing access to physical assets
US8523055B1 (en) 2002-07-16 2013-09-03 Diebold Self-Service Systems, Division Of Diebold, Incorporated Card activated cash dispensing automated banking machine
US7229009B1 (en) * 2002-07-16 2007-06-12 Diebold Self-Service Systems, Division Of Diebold, Incorporated Automated banking machine component authentication system and method
US8020759B1 (en) 2002-07-16 2011-09-20 Diebold Self-Service Systems Division Of Diebold, Incorporated Card activated cash dispensing automated banking machine
US7721951B1 (en) 2002-07-16 2010-05-25 Diebold Self-Service Systems Division Of Diebold, Incorporated Card activated cash dispensing automated banking machine component authentication system and method
US20060139147A1 (en) * 2002-08-13 2006-06-29 Hermann Sterzinger Portable security container
US8749382B2 (en) * 2002-08-13 2014-06-10 Myspace Llc Portable security container
US20110187530A1 (en) * 2002-08-13 2011-08-04 Myspace Llc Portable Security Container
US20050110609A1 (en) * 2003-01-31 2005-05-26 General Electric Company Methods for managing access to physical assets
US7042334B2 (en) 2003-01-31 2006-05-09 General Electric Company Methods for managing access to physical assets
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
US20060159306A1 (en) * 2003-03-04 2006-07-20 United Parcel Service Of America, Inc. Item tracking and processing systems and methods
US7264150B1 (en) 2003-07-24 2007-09-04 Tidel Engineering, L.P. Computerized drop safe and control software
US20050076381A1 (en) * 2003-10-03 2005-04-07 Donny Gross Electronic monitoring of activities performed at a cable television tap
US7779457B2 (en) 2004-06-09 2010-08-17 Identifid, Inc Identity verification system
US7428985B1 (en) 2004-07-22 2008-09-30 Tidel Engineering, L.P. Computerized drop safe and control software
US20060101274A1 (en) * 2004-11-05 2006-05-11 Scm Microsystems Gmbh Data transfer in an access system
US20070055891A1 (en) * 2005-09-08 2007-03-08 Serge Plotkin Protocol translation
US8898452B2 (en) * 2005-09-08 2014-11-25 Netapp, Inc. Protocol translation
US20070162390A1 (en) * 2005-12-22 2007-07-12 Macrovision Corporation Techniques for distributing and monitoring content
US20070289012A1 (en) * 2006-06-13 2007-12-13 Leemon Baird Remotely controllable security system
US20080252415A1 (en) * 2007-04-12 2008-10-16 Larson Wayne F Restricted range lockbox, access device and methods
US9670694B2 (en) 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
EP2043064A2 (en) * 2007-09-26 2009-04-01 NCR Corporation Self-service terminal
US8923806B2 (en) 2008-03-14 2014-12-30 William J. Johnson System and method for presenting application data by data processing system(s) in a vicinity
US8942732B2 (en) 2008-03-14 2015-01-27 William J. Johnson Location based exchange operating system
US8761804B2 (en) 2008-03-14 2014-06-24 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9392408B2 (en) 2008-03-14 2016-07-12 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9204275B2 (en) 2008-03-14 2015-12-01 William J. Johnson System and method for targeting data processing system(s) with data
US8750823B2 (en) 2008-03-14 2014-06-10 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9445238B2 (en) 2008-03-14 2016-09-13 William J. Johnson System and method for confirming data processing system target(s)
US9456303B2 (en) 2008-03-14 2016-09-27 William J. Johnson System and method for service access via hopped wireless mobile device(s)
US8718598B2 (en) 2008-03-14 2014-05-06 William J. Johnson System and method for location based exchange vicinity interest specification
US10477994B2 (en) 2008-03-14 2019-11-19 William J. Johnson System and method for location based exchanges of data facilitiating distributed locational applications
US10111034B2 (en) 2008-03-14 2018-10-23 Billjco Llc System and method for sound wave triggered content
US20090233623A1 (en) * 2008-03-14 2009-09-17 Johnson William J System and method for location based exchanges of data facilitating distributed locational applications
US8887177B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for automated content distribution objects
US8886226B2 (en) 2008-03-14 2014-11-11 William J. Johnson System and method for timely whereabouts determination by a mobile data processing system
US9113295B2 (en) 2008-03-14 2015-08-18 William J. Johnson System and method for location based exchange vicinity interest specification
US9100792B2 (en) 2008-03-14 2015-08-04 William J. Johnson System and method for service-free location based applications
US9088868B2 (en) 2008-03-14 2015-07-21 William J. Johnson Location based exchange permissions
US8639267B2 (en) 2008-03-14 2014-01-28 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9088869B2 (en) 2008-03-14 2015-07-21 William J. Johnson System and method for application search results by locational conditions
US8634796B2 (en) 2008-03-14 2014-01-21 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US9078095B2 (en) 2008-03-14 2015-07-07 William J. Johnson System and method for location based inventory management
US8942733B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for location based exchanges of data facilitating distributed location applications
US8942693B2 (en) 2008-03-14 2015-01-27 William J. Johnson System and method for targeting data processing system(s) with data
US9253597B2 (en) 2008-03-14 2016-02-02 William J. Johnson System and method for determining mobile users of interest
US9055406B2 (en) 2008-03-14 2015-06-09 William J. Johnson Server-less synchronized processing across a plurality of interoperating data processing systems
US9584993B2 (en) 2008-03-14 2017-02-28 William J. Johnson System and method for vector processing on behalf of image aperture aim
US8600341B2 (en) 2008-03-14 2013-12-03 William J. Johnson System and method for location based exchanges of data facilitating distributed locational applications
US9014658B2 (en) 2008-03-14 2015-04-21 William J. Johnson System and method for application context location based configuration suggestions
US8566839B2 (en) 2008-03-14 2013-10-22 William J. Johnson System and method for automated content presentation objects
US8177132B1 (en) 2008-09-17 2012-05-15 Bank Of America Corporation RFID tracking for currency transfers and transportation
US9064366B1 (en) 2008-09-17 2015-06-23 Bank Of America Corporation Blind withdrawal for transportation
US20100312709A1 (en) * 2009-06-05 2010-12-09 Dynamic Card Solutions International Payment application pin data self-encryption
US8186586B2 (en) 2009-06-05 2012-05-29 Datacard Corporation System, method, and apparatus for smart card pin management via an unconnected reader
US20100308110A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International Smart card pin management via an unconnected reader
US20100308109A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International System, method, and apparatus for smart card pin management via an unconnected reader
US8897741B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for mobile device usability by locational conditions
US8897742B2 (en) 2009-11-13 2014-11-25 William J. Johnson System and method for sudden proximal user interface
US9064268B2 (en) 2010-11-01 2015-06-23 Outerwall Inc. Gift card exchange kiosks and associated methods of use
US10600069B2 (en) 2010-11-01 2020-03-24 Cardpool, Inc. Gift card exchange kiosks and associated methods of use
US8335932B2 (en) 2010-12-17 2012-12-18 Google Inc. Local trusted services manager for a contactless smart card
US8335921B2 (en) 2010-12-17 2012-12-18 Google, Inc. Writing application data to a secure element
US8352749B2 (en) 2010-12-17 2013-01-08 Google Inc. Local trusted services manager for a contactless smart card
US8646059B1 (en) 2010-12-17 2014-02-04 Google Inc. Wallet application for interacting with a secure element application without a trusted server for authentication
US8807440B1 (en) 2010-12-17 2014-08-19 Google Inc. Routing secure element payment requests to an alternate application
US8806199B2 (en) 2010-12-17 2014-08-12 Google Inc. Writing application data to a secure element
US8793508B2 (en) 2010-12-17 2014-07-29 Google Inc. Local trusted services manager for a contactless smart card
US8379863B1 (en) 2011-09-15 2013-02-19 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US8412933B1 (en) 2011-09-15 2013-04-02 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8737621B2 (en) 2011-09-15 2014-05-27 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US9450927B2 (en) 2011-09-15 2016-09-20 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8313036B1 (en) 2011-09-16 2012-11-20 Google Inc. Secure application directory
US8297520B1 (en) 2011-09-16 2012-10-30 Google Inc. Secure application directory
US8511573B2 (en) 2011-09-16 2013-08-20 Google Inc. Secure application directory
US9141090B2 (en) 2011-11-11 2015-09-22 Master Lock Company Llc Access code management systems
US11100744B2 (en) 2011-11-23 2021-08-24 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US8874467B2 (en) 2011-11-23 2014-10-28 Outerwall Inc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US9799014B2 (en) 2011-11-23 2017-10-24 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US10716675B2 (en) 2011-11-23 2020-07-21 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US9129294B2 (en) 2012-02-06 2015-09-08 Outerwall Inc. Coin counting machines having coupon capabilities, loyalty program capabilities, advertising capabilities, and the like
CN104992319B (en) * 2012-02-28 2017-10-24 谷歌公司 Portable secure element
CN104992319A (en) * 2012-02-28 2015-10-21 谷歌公司 Portable secure element
AU2013202956B8 (en) * 2012-02-28 2013-06-27 Google Llc Portable secure element
US8625800B2 (en) 2012-02-28 2014-01-07 Google Inc. Portable secure element
US8385553B1 (en) * 2012-02-28 2013-02-26 Google Inc. Portable secure element
AU2013202956B1 (en) * 2012-02-28 2013-06-20 Google Llc Portable secure element
US9626446B2 (en) 2012-03-07 2017-04-18 Snap Trends, Inc. Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network
US8843515B2 (en) 2012-03-07 2014-09-23 Snap Trends, Inc. Methods and systems of aggregating information of social networks based on geographical locations via a network
US8971533B2 (en) 2012-04-06 2015-03-03 Google Inc. Secure reset of personal and service provider information on mobile devices
US9594982B2 (en) 2012-06-05 2017-03-14 Coinstar, Llc Optical coin discrimination systems and methods for use with consumer-operated kiosks and the like
US9036890B2 (en) 2012-06-05 2015-05-19 Outerwall Inc. Optical coin discrimination systems and methods for use with consumer-operated kiosks and the like
US8967361B2 (en) 2013-02-27 2015-03-03 Outerwall Inc. Coin counting and sorting machines
US9230381B2 (en) 2013-02-27 2016-01-05 Outerwall Inc. Coin counting and sorting machines
US9022841B2 (en) 2013-05-08 2015-05-05 Outerwall Inc. Coin counting and/or sorting machines and associated systems and methods
US9183687B2 (en) 2013-05-08 2015-11-10 Outerwall Inc. Coin counting and/or sorting machines and associated systems and methods
US9477991B2 (en) 2013-08-27 2016-10-25 Snap Trends, Inc. Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network
US10194293B2 (en) 2013-09-30 2019-01-29 William J. Johnson System and method for vital signs alerting privileged recipients
US9894489B2 (en) 2013-09-30 2018-02-13 William J. Johnson System and method for situational proximity observation alerting privileged recipients
US9443367B2 (en) 2014-01-17 2016-09-13 Outerwall Inc. Digital image coin discrimination for use with consumer-operated kiosks and the like
US9235945B2 (en) 2014-02-10 2016-01-12 Outerwall Inc. Coin input apparatuses and associated methods and systems
US10346819B2 (en) 2015-11-19 2019-07-09 Coinstar Asset Holdings, Llc Mobile device applications, other applications and associated kiosk-based systems and methods for facilitating coin saving
US9953518B2 (en) * 2016-07-29 2018-04-24 Honeywell International Inc. Systems and methods for predicting and increasing the threat level at ATM centers prior to alarm event detection
EP3425602A1 (en) * 2017-07-06 2019-01-09 Wincor Nixdorf International GmbH Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system
US11068579B2 (en) 2017-07-06 2021-07-20 Wincor Nixdorf International Gmbh Method and system of performing an authorization mechanism between a service terminal system and a helpdesk system
US11308231B2 (en) * 2020-04-30 2022-04-19 Bank Of America Corporation Security control management for information security
US11438364B2 (en) 2020-04-30 2022-09-06 Bank Of America Corporation Threat analysis for information security

Also Published As

Publication number Publication date
CA2083228C (en) 1997-05-13
EP0546701A3 (en) 1994-03-30
CA2083228A1 (en) 1993-06-10
EP0546701A2 (en) 1993-06-16
JPH0689383A (en) 1994-03-29

Similar Documents

Publication Publication Date Title
US5321242A (en) Apparatus and method for controlled access to a secured location
US5451757A (en) Apparatus and method for controlled access to a secured location
AU2006307977B2 (en) Method for controlling the locking of a lock, and lock
US6097306A (en) Programmable lock and security system therefor
CN100398364C (en) Security system of construction machinery
US6643843B1 (en) Methods and apparatus for optical communication update of program memory in embedded systems
US20070096867A1 (en) Vending machines with field-programmable electronic locks
JPH07505988A (en) electronic security system
US20040134980A1 (en) Scaleable locking
EP1096450B1 (en) Automated teller machine and method therof
JP2003090155A (en) Unlocking system
EP1926058A2 (en) Cash dispensing system
JP5255921B2 (en) Key management system
JPH06119525A (en) Method for managing automatic teller machine
US6942144B2 (en) Secure remote access to metering product enclosure
JP2002021385A (en) Portable terminal having master key function and electric lock for use therewith
KR101159984B1 (en) On line door lock control system for automatic teller machine
KR20070075141A (en) Porable input board apparatus, finance automation system, method for using the portable input board apparatus
GB2362188A (en) Security system for lockable enclosures
JPS6097469A (en) Automatic cash transaction device
JP2553239B2 (en) Information communication monitoring device
JPS60128764A (en) Locking release system of lock
JP3011652B2 (en) Cash transaction device locking device
JPH038081A (en) Automatic cash transaction device
RU2172021C1 (en) Servicing method for automated cloak-room system

Legal Events

Date Code Title Description
AS Assignment

Owner name: BRINK'S INCORPORATED

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:HEATH, WILLIAM D., JR.;REEL/FRAME:005961/0808

Effective date: 19911216

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: BRINK'S NETWORK, INC., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRINK'S INCORPORATED;REEL/FRAME:011855/0964

Effective date: 20010529

FPAY Fee payment

Year of fee payment: 8

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 12